Identity-based encryption tightly secure under chosen-ciphertext attacks
From MaRDI portal
Publication:1710596
DOI10.1007/978-3-030-03329-3_7zbMATH Open1446.94137OpenAlexW2794539407MaRDI QIDQ1710596FDOQ1710596
Authors: Dennis Hofheinz, Dingding Jia, Jia-xin Pan
Publication date: 23 January 2019
Full work available at URL: https://doi.org/10.1007/978-3-030-03329-3_7
Recommendations
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
- Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption with Tight Security Reduction
Cited In (30)
- Hierarchical Identity-Based Encryption with Tight Multi-challenge Security
- SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- An identity-based encryption scheme with compact ciphertexts
- Making Any Identity-Based Encryption Accountable, Efficiently
- Theory of Cryptography
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
- CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs
- Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman
- Unbounded HIBE with tight security
- A Framework for Identity-Based Encryption with Almost Tight Security
- Title not available (Why is that?)
- Fine-grained verifier NIZK and its applications
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Signatures of knowledge for Boolean circuits under standard assumptions
- Chosen ciphertext secure identity-based broadcast encryption in the standard model
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
- Relations Among Notions of Security for Identity Based Encryption Schemes
- Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Tightly CCA-secure inner product functional encryption scheme
- Topics in Cryptology – CT-RSA 2004
- IBE with tight security against selective opening and chosen-ciphertext attacks
- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
- Almost tight multi-user security under adaptive corruptions \& leakages in the standard model
- Identity-based authenticated encryption with identity confidentiality
- Tightly secure hierarchical identity-based encryption
- Advances in Cryptology - EUROCRYPT 2004
- Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
- Signatures of Knowledge for Boolean Circuits Under Standard Assumptions
This page was built for publication: Identity-based encryption tightly secure under chosen-ciphertext attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1710596)