Fine-grained forward secrecy: allow-list/deny-list encryption and applications
From MaRDI portal
Publication:2147256
Recommendations
- Incremental symmetric puncturable encryption with support for unbounded number of punctures
- Puncturable key wrapping and its applications
- Forward-secure encryption with fast forwarding
- Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
- Towards forward security properties for PEKS and IBE
Cites work
- scientific article; zbMATH DE number 1962139 (Why is no real title available?)
- scientific article; zbMATH DE number 2009960 (Why is no real title available?)
- scientific article; zbMATH DE number 2086722 (Why is no real title available?)
- scientific article; zbMATH DE number 2086725 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- scientific article; zbMATH DE number 1842500 (Why is no real title available?)
- scientific article; zbMATH DE number 1418310 (Why is no real title available?)
- 0-RTT key exchange with full forward secrecy
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- Challenges with assessing the impact of NFS advances on the security of pairing-based cryptography
- Chosen-Ciphertext Secure Fully Homomorphic Encryption
- Expressive key-policy attribute-based encryption with constant-size ciphertexts
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
- Hierarchical ID-Based Cryptography
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited
- Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain
- Public-key puncturable encryption: modular and compact constructions
- Revisiting proxy re-encryption: forward secrecy, improved security, and applications
- Secure integration of asymmetric and symmetric encryption schemes
- Updating key size estimations for pairings
- Watermarking cryptographic capabilities
Cited in
(4)- $$\text {Muckle}+$$: End-to-End Hybrid Authenticated Key Exchanges
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- Revisiting updatable encryption: controlled forward security, constructions and a puncturable perspective
- Spatial encryption revisited: from delegatable multiple inner product encryption and more
This page was built for publication: Fine-grained forward secrecy: allow-list/deny-list encryption and applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2147256)