Identity-based encryption tightly secure under chosen-ciphertext attacks
From MaRDI portal
Recommendations
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
- Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption with Tight Security Reduction
Cited in
(32)- Signatures of Knowledge for Boolean Circuits Under Standard Assumptions
- SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- An identity-based encryption scheme with compact ciphertexts
- Making Any Identity-Based Encryption Accountable, Efficiently
- Theory of Cryptography
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
- Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman
- CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs
- Unbounded HIBE with tight security
- A Framework for Identity-Based Encryption with Almost Tight Security
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- scientific article; zbMATH DE number 5222384 (Why is no real title available?)
- Signatures of knowledge for Boolean circuits under standard assumptions
- Fine-grained verifier NIZK and its applications
- Hierarchical identity-based encryption with tight multi-challenge security
- Almost tight multi-instance multi-ciphertext identity-based encryption on lattices
- Chosen ciphertext secure identity-based broadcast encryption in the standard model
- Relations Among Notions of Security for Identity Based Encryption Schemes
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
- Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication
- Tightly CCA-secure inner product functional encryption scheme
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- IBE with tight security against selective opening and chosen-ciphertext attacks
- Topics in Cryptology – CT-RSA 2004
- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
- Almost tight multi-user security under adaptive corruptions \& leakages in the standard model
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
- Identity-based authenticated encryption with identity confidentiality
- Tightly secure hierarchical identity-based encryption
- Advances in Cryptology - EUROCRYPT 2004
- Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
This page was built for publication: Identity-based encryption tightly secure under chosen-ciphertext attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1710596)