Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
From MaRDI portal
Publication:2413008
DOI10.1007/s10623-017-0339-3zbMath1391.68028OpenAlexW2599670565WikidataQ123151684 ScholiaQ123151684MaRDI QIDQ2413008
Shengli Liu, Baodong Qin, Shuai Han, Da-Wu Gu
Publication date: 6 April 2018
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-017-0339-3
identity-based encryptiontight security reductionCCA2 securityaffine message-authentication codeciphertext pseudorandomness
Related Items (2)
Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication ⋮ IBE with tight security against selective opening and chosen-ciphertext attacks
Cites Work
- Unnamed Item
- Unnamed Item
- New hash functions and their use in authentication and set equality
- Extended Nested Dual System Groups, Revisited
- A Framework for Identity-Based Encryption with Almost Tight Security
- An Algebraic Framework for Diffie-Hellman Assumptions
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- All-But-Many Lossy Trapdoor Functions
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
- Identity-Based Cryptosystems and Signature Schemes
- Identity-Based Encryption Secure against Selective Opening Attack
- Number-theoretic constructions of efficient pseudo-random functions
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Efficient Pseudorandom Functions via On-the-Fly Adaptation
- Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
- Efficient Lattice (H)IBE in the Standard Model
- Practical Identity-Based Encryption Without Random Oracles
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Realizing Hash-and-Sign Signatures under Standard Assumptions
- A Pseudorandom Generator from any One-way Function
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
This page was built for publication: Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness