From selective IBE to full IBE and selective HIBE

From MaRDI portal
Publication:1690200

DOI10.1007/978-3-319-70500-2_13zbMath1385.94034OpenAlexW2766646020MaRDI QIDQ1690200

Sanjam Garg, Nico Döttling

Publication date: 19 January 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-70500-2_13




Related Items (23)

Generic Constructions of Revocable Identity-Based EncryptionMaster-Key KDM-Secure IBE from PairingsAnonymous IBE, leakage resilience and circular security from new assumptionsOptimal bounded-collusion secure functional encryptionBounded Collusion ABE for TMs from IBEEfficient laconic cryptography from learning with errorsUnique-path identity based encryption with applications to strongly secure messagingIBE with incompressible master secret and small identity secretsBounded functional encryption for Turing machines: adaptive security from general assumptionsForward-secure encryption with fast forwardingSublinear secure computation from new assumptionsHow to build a trapdoor function from an encryption schemeLaconic private set intersection and applicationsRing-based identity based encryption -- asymptotically shorter MPK and tighter securityUpdatable public key encryption in the standard modelCollusion Resistant Traitor Tracing from Learning with ErrorsEfficient identity-based encryption with hierarchical key-insulation from HIBEAdaptively secure revocable hierarchical IBE from \(k\)-linear assumptionMinicrypt primitives with algebraic structure and applicationsNew constructions of hinting PRGs, OWFs with encryption, and moreVerifiable registration-based encryptionChosen ciphertext security from injective trapdoor functionsLattice-based revocable (hierarchical) IBE with decryption key exposure resistance




This page was built for publication: From selective IBE to full IBE and selective HIBE