A Framework for Identity-Based Encryption with Almost Tight Security
From MaRDI portal
Publication:2811145
DOI10.1007/978-3-662-48797-6_22zbMATH Open1380.94069OpenAlexW2295458626MaRDI QIDQ2811145FDOQ2811145
Shota Yamada, Goichiro Hanaoka, Nuttapong Attrapadung
Publication date: 10 June 2016
Published in: Advances in Cryptology -- ASIACRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48797-6_22
Cited In (34)
- Hierarchical Identity-Based Encryption with Tight Multi-challenge Security
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
- Tightly secure (H)IBE in the random oracle model
- An identity-based encryption scheme with compact ciphertexts
- Adaptive Partitioning
- Making Any Identity-Based Encryption Accountable, Efficiently
- Generic constructions of master-key KDM secure attribute-based encryption
- Towards Tightly Secure Lattice Short Signature and Id-Based Encryption
- Revisiting updatable encryption: controlled forward security, constructions and a puncturable perspective
- Master-Key KDM-Secure IBE from Pairings
- CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs
- Unbounded HIBE with tight security
- A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME
- Short tightly secure signatures for signing a vector of group elements: a new approach
- Title not available (Why is that?)
- Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- Generic constructions for fully secure revocable attribute-based encryption
- Tightly Secure IBE Under Constant-Size Master Public Key
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
- Dรฉjร Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions
- Almost Tight Security in Lattices with Polynomial Moduli โ PRF, IBE, All-but-many LTF, and More
- Compact structure-preserving signatures with almost tight security
- Cryptography and Coding
- Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance
- Master-key KDM-secure ABE via predicate encoding
- Efficient identity-based encryption from LWR
- IBE with tight security against selective opening and chosen-ciphertext attacks
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting
- New Proof for BKP IBE Scheme and Improvement in the MIMC Setting
- Identity-based authenticated encryption with identity confidentiality
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- Tightly secure inner product functional encryption: multi-input and function-hiding constructions
Recommendations
- Identity-based encryption tightly secure under chosen-ciphertext attacks ๐ ๐
- Efficient Identity-Based Encryption with Tight Security Reduction ๐ ๐
- A tapestry of identity-based encryption: practical frameworks compared ๐ ๐
- Identity-based authenticated encryption with identity confidentiality ๐ ๐
- Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting ๐ ๐
- An identity-based encryption scheme with compact ciphertexts ๐ ๐
- Title not available (Why is that?) ๐ ๐
- Idealizing Identity-Based Encryption ๐ ๐
- Verifiable security of Boneh-Franklin identity-based encryption ๐ ๐
This page was built for publication: A Framework for Identity-Based Encryption with Almost Tight Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2811145)