KDM security for identity-based encryption: constructions and separations
DOI10.1016/J.INS.2019.02.036zbMATH Open1451.68092OpenAlexW2576625905WikidataQ123367169 ScholiaQ123367169MaRDI QIDQ2215124FDOQ2215124
Authors: Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang
Publication date: 10 December 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2019.02.036
Recommendations
- Circular and KDM security for identity-based encryption
- Master-key KDM-secure IBE from pairings
- Key dependent message security and receiver selective opening security for identity-based encryption
- Key dependent message security for revocable identity-based encryption and identity-based encryption
- New constructions of identity-based and key-dependent message secure encryption schemes
identity-based encryptionindistinguishability obfuscationidentity-based hash proof systemkey-dependent message securityunique puncturable signature
Cites Work
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Fully homomorphic encryption using ideal lattices
- A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model
- Practical Identity-Based Encryption Without Random Oracles
- Title not available (Why is that?)
- Title not available (Why is that?)
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Circular-Secure Encryption from Decision Diffie-Hellman
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- Title not available (Why is that?)
- Public-key encryption in the bounded-retrieval model
- Title not available (Why is that?)
- Encryption schemes secure under related-key and key-dependent message attacks
- On the (Im)Possibility of Key Dependent Encryption
- How to use indistinguishability obfuscation
- KDM-security via homomorphic smooth projective hashing
- Title not available (Why is that?)
- Adaptive trapdoor functions and chosen-ciphertext security
- On extractability obfuscation
- Identity-based encryption with master key-dependent message security and leakage-resilience
- Identity-based trapdoor mercurial commitments and applications
- Black-box circular-secure encryption beyond affine functions
- Cryptographic agility and its relation to circular encryption
- Bounded key-dependent message security
- Insight of the protection for data security under selective opening attacks
- Key-dependent message security: generic amplification and completeness
- Soundness of Formal Encryption in the Presence of Key-Cycles
- New constructions of identity-based and key-dependent message secure encryption schemes
- Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption
- The Magic of ELFs
- Circular and KDM security for identity-based encryption
- Separations in circular security for arbitrary length key cycles
- Efficient circuit-size independent public key encryption with KDM security
- Obfuscation \(\Rightarrow\) (IND-CPA security \(\nRightarrow\) circular security)
- New definitions and separations for circular security
- New circular security counterexamples from decision linear and learning with errors
- Circular Security Separations for Arbitrary Length Cycles from LWE
- Toward fine-grained blackbox separations between semantic and circular-security notions
- Constrained verifiable random functions
- On generic constructions of circularly-secure, leakage-resilient public-key encryption schemes
- Bounded KDM security from iO and OWF
- Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE
Cited In (12)
- Generic constructions of master-key KDM secure attribute-based encryption
- Identity-based encryption with master key-dependent message security and leakage-resilience
- New constructions of identity-based and key-dependent message secure encryption schemes
- Key dependent message security and receiver selective opening security for identity-based encryption
- Circular and KDM security for identity-based encryption
- Title not available (Why is that?)
- Master-key KDM-secure IBE from pairings
- The KDM-CCA Security of REACT
- Adaptively secure puncturable pseudorandom functions via puncturable identity-based KEMs
- KDM-CCA Security from RKA Secure Authenticated Encryption
- Key-dependent message security for division function: discouraging anonymous credential sharing
- Bounded KDM security from iO and OWF
This page was built for publication: KDM security for identity-based encryption: constructions and separations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2215124)