Verifiable registration-based encryption
From MaRDI portal
Publication:2096501
Recommendations
- Registration-based encryption: removing private-key generator from IBE
- Optimizing registration based encryption
- Registration-based encryption from standard assumptions
- Lower bounds for the number of decryption updates in registration-based encryption
- Revocable IBE systems with almost constant-size key update
Cites work
- scientific article; zbMATH DE number 2163009 (Why is no real title available?)
- scientific article; zbMATH DE number 1842483 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- A method for obtaining digital signatures and public-key cryptosystems
- Advances in Cryptology - CRYPTO 2003
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Certificateless public key cryptography
- Distributed private-key generators for identity-based cryptography
- From selective IBE to full IBE and selective HIBE
- Functional encryption: definitions and challenges
- Fuzzy Identity-Based Encryption
- Identity-based cryptosystems and signature schemes
- Identity-based encryption from the Diffie-Hellman assumption
- Laconic oblivious transfer and its applications
- New constructions of identity-based and key-dependent message secure encryption schemes
- New directions in cryptography
- Probabilistic encryption
- Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments
- Reducing Trust in the PKG in Identity Based Cryptosystems
- Registration-based encryption from standard assumptions
- Registration-based encryption: removing private-key generator from IBE
- Removing Escrow from Identity-Based Encryption
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- Separating succinct non-interactive arguments from all falsifiable assumptions
- Short pairing-based non-interactive zero-knowledge arguments
- Succinct arguments from multi-prover interactive proofs and their efficiency benefits
Cited in
(19)- Efficient laconic cryptography from learning with errors
- Lower bounds on assumptions behind registration-based encryption
- Registration-based encryption: removing private-key generator from IBE
- Lower bounds for the number of decryption updates in registration-based encryption
- Cuckoo commitments: registration-based encryption and key-value map commitments for large spaces
- Registered ABE via predicate encodings
- Registered (inner-product) functional encryption
- Optimizing registration based encryption
- Registered attribute-based encryption
- How to use (plain) witness encryption: registered ABE, flexible broadcast, and more
- Dynamic collusion functional encryption and multi-authority attribute-based encryption
- Registered functional encryptions from pairings
- Online mergers and applications to registration-based encryption and accumulators
- Identity-based encryption with security against the KGC: a formal model and its instantiations
- Registration-based encryption from standard assumptions
- Laconic private set intersection and applications
- A modular approach to registered ABE for unbounded predicates
- Threshold encryption with silent setup
- Universal vector commitments
This page was built for publication: Verifiable registration-based encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2096501)