Fine-grained forward secrecy: allow-list/deny-list encryption and applications
From MaRDI portal
Publication:2147256
DOI10.1007/978-3-662-64331-0_26zbMATH Open1491.94045OpenAlexW3209262083MaRDI QIDQ2147256FDOQ2147256
Authors: David Derler, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
Publication date: 22 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-662-64331-0_26
Recommendations
- Incremental symmetric puncturable encryption with support for unbounded number of punctures
- Puncturable key wrapping and its applications
- Forward-secure encryption with fast forwarding
- Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
- Towards forward security properties for PEKS and IBE
Cites Work
- Hierarchical ID-Based Cryptography
- Title not available (Why is that?)
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Title not available (Why is that?)
- Title not available (Why is that?)
- Secure integration of asymmetric and symmetric encryption schemes
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Title not available (Why is that?)
- Expressive key-policy attribute-based encryption with constant-size ciphertexts
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
- On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited
- Updating key size estimations for pairings
- Watermarking cryptographic capabilities
- Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain
- Chosen-Ciphertext Secure Fully Homomorphic Encryption
- Challenges with assessing the impact of NFS advances on the security of pairing-based cryptography
- Revisiting proxy re-encryption: forward secrecy, improved security, and applications
- 0-RTT Key Exchange with Full Forward Secrecy
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- Public-Key Puncturable Encryption: Modular and Compact Constructions
Cited In (3)
Uses Software
This page was built for publication: Fine-grained forward secrecy: allow-list/deny-list encryption and applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2147256)