Fine-grained forward secrecy: allow-list/deny-list encryption and applications
From MaRDI portal
Publication:2147256
DOI10.1007/978-3-662-64331-0_26zbMATH Open1491.94045OpenAlexW3209262083MaRDI QIDQ2147256FDOQ2147256
Christoph Striecks, David Derler, Sebastian Ramacher, Daniel Slamanig
Publication date: 22 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-662-64331-0_26
Cites Work
- Hierarchical ID-Based Cryptography
- Title not available (Why is that?)
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Title not available (Why is that?)
- Title not available (Why is that?)
- Secure integration of asymmetric and symmetric encryption schemes
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Title not available (Why is that?)
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
- On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited
- Updating key size estimations for pairings
- Watermarking cryptographic capabilities
- Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain
- Chosen-Ciphertext Secure Fully Homomorphic Encryption
- Challenges with assessing the impact of NFS advances on the security of pairing-based cryptography
- Revisiting proxy re-encryption: forward secrecy, improved security, and applications
- 0-RTT Key Exchange with Full Forward Secrecy
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- Public-Key Puncturable Encryption: Modular and Compact Constructions
Cited In (3)
Uses Software
This page was built for publication: Fine-grained forward secrecy: allow-list/deny-list encryption and applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2147256)