Generic constructions of identity-based and certificateless kEMs
From MaRDI portal
Publication:2425527
DOI10.1007/s00145-007-9000-zzbMath1143.94340OpenAlexW2050773464MaRDI QIDQ2425527
Pooya Farshim, Nigel P. Smart, K. Bentahar, John Malone-Lee
Publication date: 6 May 2008
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: http://link.springer.com/article/10.1007/s00145-007-9000-z
Related Items (29)
An efficient IBE scheme with tight security reduction in the random oracle model ⋮ Privacy-preserving file sharing on cloud storage with certificateless signcryption ⋮ Certificateless signcryption scheme in the standard model ⋮ Constructions of CCA-Secure Revocable Identity-Based Encryption ⋮ Simulation-based selective opening security for receivers under chosen-ciphertext attacks ⋮ Timed-release computational secret sharing and threshold encryption ⋮ Certificateless public key encryption: a new generic construction and two pairing-free schemes ⋮ Certificateless Public Key Signature Schemes from Standard Algorithms ⋮ Wildcarded identity-based encryption ⋮ New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model ⋮ Certificateless threshold cryptosystem secure against chosen-ciphertext attack ⋮ New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem ⋮ Efficient Certificateless KEM in the Standard Model ⋮ Tag-KEM/DEM: A new framework for hybrid encryption ⋮ Self-generated-certificate public key encryption without pairing and its application ⋮ Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism ⋮ Certificateless cryptography with KGC trust level 3 ⋮ On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups ⋮ Strongly Secure Certificateless Public Key Encryption Without Pairing ⋮ Universally Anonymous IBE Based on the Quadratic Residuosity Assumption ⋮ Verifiable random functions: relations to identity-based key encapsulation and new constructions ⋮ Verifiable Random Functions from Identity-Based Key Encapsulation ⋮ Strongly Secure Certificateless Key Agreement ⋮ Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance ⋮ Generic Construction of Stateful Identity Based Encryption ⋮ A new certificateless public key encryption scheme ⋮ New Anonymity Notions for Identity-Based Encryption ⋮ Direct chosen-ciphertext secure identity-based key encapsulation without random oracles ⋮ New Anonymity Notions for Identity-Based Encryption
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Practical Identity-Based Encryption Without Random Oracles
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Identity-Based Encryption from the Weil Pairing
- Secure integration of asymmetric and symmetric encryption schemes
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Cryptography and Coding
- Public Key Cryptography - PKC 2005
- Cryptography and Coding
- Cryptography and Coding
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: Generic constructions of identity-based and certificateless kEMs