A Framework for Identity-Based Encryption with Almost Tight Security
From MaRDI portal
Publication:2811145
DOI10.1007/978-3-662-48797-6_22zbMATH Open1380.94069OpenAlexW2295458626MaRDI QIDQ2811145FDOQ2811145
Authors: Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
Publication date: 10 June 2016
Published in: Advances in Cryptology -- ASIACRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48797-6_22
Recommendations
- Identity-based encryption tightly secure under chosen-ciphertext attacks
- Efficient Identity-Based Encryption with Tight Security Reduction
- A tapestry of identity-based encryption: practical frameworks compared
- Identity-based authenticated encryption with identity confidentiality
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
- An identity-based encryption scheme with compact ciphertexts
- An identity-based homomorphic encryption scheme
- Idealizing identity-based encryption
- Verifiable security of Boneh-Franklin identity-based encryption
Cited In (40)
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
- Tightly secure (H)IBE in the random oracle model
- An identity-based encryption scheme with compact ciphertexts
- Making Any Identity-Based Encryption Accountable, Efficiently
- Generic constructions of master-key KDM secure attribute-based encryption
- Revisiting updatable encryption: controlled forward security, constructions and a puncturable perspective
- CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs
- Unbounded HIBE with tight security
- A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME
- Short tightly secure signatures for signing a vector of group elements: a new approach
- Déjà Q: encore! Un petit IBE
- Title not available (Why is that?)
- Hierarchical identity-based encryption with tight multi-challenge security
- New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security
- Almost tight multi-instance multi-ciphertext identity-based encryption on lattices
- Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- Efficient IBE with tight reduction to standard assumption in the multi-challenge setting
- Adaptive partitioning
- Generic constructions for fully secure revocable attribute-based encryption
- Tightly Secure IBE Under Constant-Size Master Public Key
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
- Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions
- Compact IBBE and fuzzy IBE from simple assumptions
- Compact structure-preserving signatures with almost tight security
- Master-key KDM-secure IBE from pairings
- Cryptography and Coding
- Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance
- Master-key KDM-secure ABE via predicate encoding
- Efficient identity-based encryption from LWR
- IBE with tight security against selective opening and chosen-ciphertext attacks
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- Bounded-collusion identity-based encryption from semantically-secure public-key encryption: generic constructions with short ciphertexts
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
- New Proof for BKP IBE Scheme and Improvement in the MIMC Setting
- Identity-based authenticated encryption with identity confidentiality
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- Towards tightly secure lattice short signature and id-based encryption
- Almost tight security in lattices with polynomial moduli -- PRF, IBE, all-but-many LTF, and more
- Tightly secure inner product functional encryption: multi-input and function-hiding constructions
This page was built for publication: A Framework for Identity-Based Encryption with Almost Tight Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2811145)