Identity-based encryption tightly secure under chosen-ciphertext attacks
From MaRDI portal
Publication:1710596
Recommendations
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
- Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption with Tight Security Reduction
Cited in
(32)- Almost tight multi-user security under adaptive corruptions \& leakages in the standard model
- Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
- Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman
- CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs
- Fine-grained verifier NIZK and its applications
- SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Relations Among Notions of Security for Identity Based Encryption Schemes
- IBE with tight security against selective opening and chosen-ciphertext attacks
- Identity-based authenticated encryption with identity confidentiality
- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Advances in Cryptology - EUROCRYPT 2004
- Tightly CCA-secure inner product functional encryption scheme
- Almost tight multi-instance multi-ciphertext identity-based encryption on lattices
- scientific article; zbMATH DE number 5222384 (Why is no real title available?)
- Signatures of Knowledge for Boolean Circuits Under Standard Assumptions
- Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication
- Chosen ciphertext secure identity-based broadcast encryption in the standard model
- Signatures of knowledge for Boolean circuits under standard assumptions
- Hierarchical identity-based encryption with tight multi-challenge security
- Unbounded HIBE with tight security
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- An identity-based encryption scheme with compact ciphertexts
- Tightly secure hierarchical identity-based encryption
- Topics in Cryptology – CT-RSA 2004
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
- A Framework for Identity-Based Encryption with Almost Tight Security
- Making Any Identity-Based Encryption Accountable, Efficiently
- Theory of Cryptography
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
This page was built for publication: Identity-based encryption tightly secure under chosen-ciphertext attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1710596)