New constructions of identity-based and key-dependent message secure encryption schemes
From MaRDI portal
Publication:1749271
Recommendations
- KDM security for identity-based encryption: constructions and separations
- Circular and KDM security for identity-based encryption
- Master-key KDM-secure IBE from pairings
- Key dependent message security and receiver selective opening security for identity-based encryption
- Identity-based encryption with master key-dependent message security and leakage-resilience
Cited in
(27)- Adaptively secure garbling schemes for parallel computations
- Bounded functional encryption for Turing machines: adaptive security from general assumptions
- KDM security for identity-based encryption: constructions and separations
- Key dependent message security for revocable identity-based encryption and identity-based encryption
- Efficient laconic cryptography from learning with errors
- Registration-based encryption: removing private-key generator from IBE
- A simple construction of iO for Turing machines
- Succinct garbling schemes from functional encryption through a local simulation paradigm
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Minicrypt primitives with algebraic structure and applications
- Non-interactive batch arguments for NP from standard assumptions
- scientific article; zbMATH DE number 5222384 (Why is no real title available?)
- Optimizing registration based encryption
- How to build a trapdoor function from an encryption scheme
- Anonymous (hierarchical) identity-based encryption from broader assumptions
- CCA security and trapdoor functions via key-dependent-message security
- Dynamic collusion functional encryption and multi-authority attribute-based encryption
- Master-key KDM-secure ABE via predicate encoding
- Verifiable registration-based encryption
- CPA-to-CCA transformation for KDM security
- Laconic private set intersection and applications
- IBE with incompressible master secret and small identity secrets
- Non-committing encryption with constant ciphertext expansion from standard assumptions
- One-out-of-many unclonable cryptography: definitions, constructions, and more
- Chosen ciphertext security from injective trapdoor functions
- New constructions of hinting PRGs, OWFs with encryption, and more
- A conceptually simple and generic construction of plaintext checkable encryption in the standard model
This page was built for publication: New constructions of identity-based and key-dependent message secure encryption schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1749271)