An efficient IBE scheme with tight security reduction in the random oracle model
From MaRDI portal
(Redirected from Publication:264126)
Recommendations
- Efficient Identity-Based Encryption with Tight Security Reduction
- A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model
- Practical Identity-Based Encryption Without Random Oracles
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient selective identity-based encryption without random oracles
Cites work
- scientific article; zbMATH DE number 1583788 (Why is no real title available?)
- scientific article; zbMATH DE number 2009960 (Why is no real title available?)
- scientific article; zbMATH DE number 2009970 (Why is no real title available?)
- scientific article; zbMATH DE number 2086725 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- A tapestry of identity-based encryption: practical frameworks compared
- A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
- Automata, Languages and Programming
- Bonsai trees, or how to delegate a lattice basis
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Cryptography and Coding
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient Identity-Based Encryption with Tight Security Reduction
- Efficient lattice (H)IBE in the standard model
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- Functional encryption for inner product predicates from learning with errors
- Functional encryption: definitions and challenges
- Fuzzy Identity-Based Encryption
- Generic constructions of identity-based and certificateless kEMs
- Hierarchical ID-Based Cryptography
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Hierarchical Identity Based Encryption with Polynomially Many Levels
- Identity-based cryptosystems and signature schemes
- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Practical Identity-Based Encryption Without Random Oracles
- Public Key Cryptography - PKC 2006
- Public key broadcast encryption for stateless receivers
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Secure integration of asymmetric and symmetric encryption schemes
- The exact security of digital signatures -- how to sign with RSA and Rabin
- Trapdoors for hard lattices and new cryptographic constructions
Cited in
(13)- Iterated random oracle: a universal approach for finding loss in security reduction
- Information Security and Cryptology - ICISC 2005
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient Identity-Based Encryption with Tight Security Reduction
- Efficient selective identity-based encryption without random oracles
- A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model
- Fully secure IBE with tighter reduction in prime order bilinear groups
- An IBE scheme using ECC combined public key
- Tightly Secure IBE Under Constant-Size Master Public Key
- Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes
- Practical Identity-Based Encryption Without Random Oracles
- OrBit: OR-proof identity-based identification with tight security for (as low as) 1-bit loss
This page was built for publication: An efficient IBE scheme with tight security reduction in the random oracle model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q264126)