Verifiable registration-based encryption
From MaRDI portal
Publication:2096501
DOI10.1007/978-3-030-56784-2_21zbMATH Open1504.94142OpenAlexW2982636075MaRDI QIDQ2096501FDOQ2096501
Authors: Rishab Goyal, Satyanarayana Vusirikala
Publication date: 9 November 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56784-2_21
Recommendations
- Registration-based encryption: removing private-key generator from IBE
- Optimizing registration based encryption
- Registration-based encryption from standard assumptions
- Lower bounds for the number of decryption updates in registration-based encryption
- Revocable IBE systems with almost constant-size key update
Cites Work
- Probabilistic encryption
- A method for obtaining digital signatures and public-key cryptosystems
- Identity-based cryptosystems and signature schemes
- Functional encryption: definitions and challenges
- New directions in cryptography
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Title not available (Why is that?)
- Fuzzy Identity-Based Encryption
- Certificateless public key cryptography
- Advances in Cryptology - CRYPTO 2003
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Separating succinct non-interactive arguments from all falsifiable assumptions
- Short pairing-based non-interactive zero-knowledge arguments
- Reducing Trust in the PKG in Identity Based Cryptosystems
- Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments
- Identity-based encryption from the Diffie-Hellman assumption
- Title not available (Why is that?)
- Laconic oblivious transfer and its applications
- Distributed private-key generators for identity-based cryptography
- Registration-based encryption: removing private-key generator from IBE
- Anonymous IBE, leakage resilience and circular security from new assumptions
- New constructions of identity-based and key-dependent message secure encryption schemes
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- Removing Escrow from Identity-Based Encryption
- Title not available (Why is that?)
- From selective IBE to full IBE and selective HIBE
- Succinct arguments from multi-prover interactive proofs and their efficiency benefits
- Registration-based encryption from standard assumptions
Cited In (19)
- Efficient laconic cryptography from learning with errors
- Lower bounds on assumptions behind registration-based encryption
- Registration-based encryption: removing private-key generator from IBE
- Lower bounds for the number of decryption updates in registration-based encryption
- Cuckoo commitments: registration-based encryption and key-value map commitments for large spaces
- Registered ABE via predicate encodings
- Registered (inner-product) functional encryption
- Optimizing registration based encryption
- Registered attribute-based encryption
- How to use (plain) witness encryption: registered ABE, flexible broadcast, and more
- Dynamic collusion functional encryption and multi-authority attribute-based encryption
- Registered functional encryptions from pairings
- Online mergers and applications to registration-based encryption and accumulators
- Identity-based encryption with security against the KGC: a formal model and its instantiations
- Registration-based encryption from standard assumptions
- A modular approach to registered ABE for unbounded predicates
- Laconic private set intersection and applications
- Threshold encryption with silent setup
- Universal vector commitments
This page was built for publication: Verifiable registration-based encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2096501)