Optimizing registration based encryption
From MaRDI portal
Publication:2149790
DOI10.1007/978-3-030-92641-0_7zbMATH Open1492.94084OpenAlexW4205324170MaRDI QIDQ2149790FDOQ2149790
Authors: Kelong Cong, Karim Eldefrawy, N. P. Smart
Publication date: 29 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-92641-0_7
Recommendations
- Registration-based encryption: removing private-key generator from IBE
- Verifiable registration-based encryption
- Registration-based encryption from standard assumptions
- Lower bounds for the number of decryption updates in registration-based encryption
- Revocable IBE systems with almost constant-size key update
Cites Work
- A method for obtaining digital signatures and public-key cryptosystems
- Identity-based cryptosystems and signature schemes
- Functional encryption: definitions and challenges
- New directions in cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fuzzy Identity-Based Encryption
- Certificateless public key cryptography
- Improved Garbled Circuit: Free XOR Gates and Applications
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Title not available (Why is that?)
- Patricia tries again revisited
- Distributed private-key generators for identity-based cryptography
- An experimental study of compression methods for dynamic tries
- External profile of symmetric digital search trees (extended abstract)
- Registration-based encryption: removing private-key generator from IBE
- Anonymous IBE, leakage resilience and circular security from new assumptions
- New constructions of identity-based and key-dependent message secure encryption schemes
- On the communication complexity of secure function evaluation with long output
- Removing Escrow from Identity-Based Encryption
- Verifiable registration-based encryption
- Registration-based encryption from standard assumptions
- Limit laws for the height in PATRICIA tries
Cited In (13)
- Lower bounds on assumptions behind registration-based encryption
- Registration-based encryption: removing private-key generator from IBE
- Lower bounds for the number of decryption updates in registration-based encryption
- Cuckoo commitments: registration-based encryption and key-value map commitments for large spaces
- Registered ABE via predicate encodings
- Registered (inner-product) functional encryption
- Registered attribute-based encryption
- How to use (plain) witness encryption: registered ABE, flexible broadcast, and more
- Online mergers and applications to registration-based encryption and accumulators
- Verifiable registration-based encryption
- Registration-based encryption from standard assumptions
- A modular approach to registered ABE for unbounded predicates
- Threshold encryption with silent setup
Uses Software
This page was built for publication: Optimizing registration based encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2149790)