Identity-based encryption from the Diffie-Hellman assumption

From MaRDI portal
Publication:1675739

DOI10.1007/978-3-319-63688-7_18zbMath1385.94033OpenAlexW2729240356MaRDI QIDQ1675739

Sanjam Garg, Nico Döttling

Publication date: 3 November 2017

Full work available at URL: https://doi.org/10.1007/978-3-319-63688-7_18




Related Items (48)

Generic Constructions of Revocable Identity-Based EncryptionMaster-Key KDM-Secure IBE from PairingsRegistration-based encryption: removing private-key generator from IBEA simple construction of iO for Turing machinesSuccinct garbling schemes from functional encryption through a local simulation paradigmFunctional encryption for Turing machines with dynamic bounded collusion from LWENon-interactive batch arguments for NP from standard assumptionsA pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumptionAn improved affine equivalence algorithm for random permutationsAnonymous IBE, leakage resilience and circular security from new assumptionsOptimal bounded-collusion secure functional encryptionAdaptively secure garbling schemes for parallel computationsForward-secure revocable identity-based encryptionBounded Collusion ABE for TMs from IBEEfficient laconic cryptography from learning with errorsUnique-path identity based encryption with applications to strongly secure messagingElliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive surveyIdentity-based encryption in DDH hard groupsOn Constructing Pairing-Free Identity-Based EncryptionsIBE with incompressible master secret and small identity secretsBounded functional encryption for Turing machines: adaptive security from general assumptionsForward-secure encryption with fast forwardingSublinear secure computation from new assumptionsUniversal amplification of KDM security: from 1-key circular to multi-key KDMHow to build a trapdoor function from an encryption schemeTo label, or not to label (in generic groups)Lower bounds for the number of decryption updates in registration-based encryptionCorrelation intractability and SNARGs from sub-exponential DDHNon-committing encryption with constant ciphertext expansion from standard assumptionsCryptographic group actions and applicationsLaconic private set intersection and applicationsAmortizing rate-1 OT and applications to PIR and PSIUpdatable public key encryption in the standard modelOn the impossibility of purely algebraic signaturesCollusion Resistant Traitor Tracing from Learning with ErrorsEfficient identity-based encryption with hierarchical key-insulation from HIBEFunctional encryption for cubic polynomials and implementationInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Simple and generic constructions of succinct functional encryptionMinicrypt primitives with algebraic structure and applicationsNon-interactive zero knowledge from sub-exponential DDHGeneric construction of server-aided revocable hierarchical identity-based encryptionNew constructions of hinting PRGs, OWFs with encryption, and moreVerifiable registration-based encryptionNew techniques for traitor tracing: size \(N^{1/3}\) and more from pairingsDynamic decentralized functional encryptionChosen ciphertext security from injective trapdoor functions




This page was built for publication: Identity-based encryption from the Diffie-Hellman assumption