New constructions of identity-based and key-dependent message secure encryption schemes
From MaRDI portal
Publication:1749271
DOI10.1007/978-3-319-76578-5_1zbMATH Open1385.94035OpenAlexW2792153250MaRDI QIDQ1749271FDOQ1749271
Authors: Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny
Publication date: 16 May 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-76578-5_1
Recommendations
- KDM security for identity-based encryption: constructions and separations
- Circular and KDM security for identity-based encryption
- Master-key KDM-secure IBE from pairings
- Key dependent message security and receiver selective opening security for identity-based encryption
- Identity-based encryption with master key-dependent message security and leakage-resilience
Cited In (27)
- KDM security for identity-based encryption: constructions and separations
- Key dependent message security for revocable identity-based encryption and identity-based encryption
- Efficient laconic cryptography from learning with errors
- Minicrypt primitives with algebraic structure and applications
- Registration-based encryption: removing private-key generator from IBE
- A simple construction of iO for Turing machines
- Succinct garbling schemes from functional encryption through a local simulation paradigm
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Non-interactive batch arguments for NP from standard assumptions
- Title not available (Why is that?)
- How to build a trapdoor function from an encryption scheme
- Optimizing registration based encryption
- Anonymous (hierarchical) identity-based encryption from broader assumptions
- CCA security and trapdoor functions via key-dependent-message security
- Dynamic collusion functional encryption and multi-authority attribute-based encryption
- Master-key KDM-secure ABE via predicate encoding
- Verifiable registration-based encryption
- CPA-to-CCA transformation for KDM security
- IBE with incompressible master secret and small identity secrets
- Laconic private set intersection and applications
- Non-committing encryption with constant ciphertext expansion from standard assumptions
- One-out-of-many unclonable cryptography: definitions, constructions, and more
- A conceptually simple and generic construction of plaintext checkable encryption in the standard model
- Chosen ciphertext security from injective trapdoor functions
- New constructions of hinting PRGs, OWFs with encryption, and more
- Bounded functional encryption for Turing machines: adaptive security from general assumptions
- Adaptively secure garbling schemes for parallel computations
This page was built for publication: New constructions of identity-based and key-dependent message secure encryption schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1749271)