From selective IBE to full IBE and selective HIBE
From MaRDI portal
Publication:1690200
DOI10.1007/978-3-319-70500-2_13zbMath1385.94034OpenAlexW2766646020MaRDI QIDQ1690200
Publication date: 19 January 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-70500-2_13
Related Items (23)
Generic Constructions of Revocable Identity-Based Encryption ⋮ Master-Key KDM-Secure IBE from Pairings ⋮ Anonymous IBE, leakage resilience and circular security from new assumptions ⋮ Optimal bounded-collusion secure functional encryption ⋮ Bounded Collusion ABE for TMs from IBE ⋮ Efficient laconic cryptography from learning with errors ⋮ Unique-path identity based encryption with applications to strongly secure messaging ⋮ IBE with incompressible master secret and small identity secrets ⋮ Bounded functional encryption for Turing machines: adaptive security from general assumptions ⋮ Forward-secure encryption with fast forwarding ⋮ Sublinear secure computation from new assumptions ⋮ How to build a trapdoor function from an encryption scheme ⋮ Laconic private set intersection and applications ⋮ Ring-based identity based encryption -- asymptotically shorter MPK and tighter security ⋮ Updatable public key encryption in the standard model ⋮ Collusion Resistant Traitor Tracing from Learning with Errors ⋮ Efficient identity-based encryption with hierarchical key-insulation from HIBE ⋮ Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption ⋮ Minicrypt primitives with algebraic structure and applications ⋮ New constructions of hinting PRGs, OWFs with encryption, and more ⋮ Verifiable registration-based encryption ⋮ Chosen ciphertext security from injective trapdoor functions ⋮ Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
This page was built for publication: From selective IBE to full IBE and selective HIBE