Fully CCA2 secure identity based broadcast encryption without random oracles
From MaRDI portal
Recommendations
- Cryptanalysis of an identity based broadcast encryption scheme without random oracles
- Advances in Cryptology – CRYPTO 2004
- Forward-secure identity-based public-key encryption without random oracles
- Efficient Identity-Based Encryption Without Random Oracles
- Identity based broadcast encryption without pairings
- A CCA-secure identity-based conditional proxy re-encryption without random oracles
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
Cites work
- scientific article; zbMATH DE number 1024079 (Why is no real title available?)
- scientific article; zbMATH DE number 1942412 (Why is no real title available?)
- scientific article; zbMATH DE number 1775406 (Why is no real title available?)
- scientific article; zbMATH DE number 1842485 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Efficient Identity-Based Encryption Without Random Oracles
- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Identity-based cryptosystems and signature schemes
- Practical Identity-Based Encryption Without Random Oracles
Cited in
(8)- Anonymous certificate-based broadcast encryption with constant decryption cost
- Efficient anonymous multi-group broadcast encryption
- Cryptanalysis of an identity based broadcast encryption scheme without random oracles
- Adaptively secure certificate-based broadcast encryption and its application to cloud storage service
- Identity based broadcast encryption without pairings
- Generic anonymous identity-based broadcast encryption with chosen-ciphertext security
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
This page was built for publication: Fully CCA2 secure identity based broadcast encryption without random oracles
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q987813)