Bounded-Collusion IBE from Key Homomorphism
From MaRDI portal
Publication:2891506
DOI10.1007/978-3-642-28914-9_32zbMath1296.94118OpenAlexW2096326072MaRDI QIDQ2891506
Allison Lewko, Shafi Goldwasser, David A. Wilson
Publication date: 15 June 2012
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-28914-9_32
Related Items (9)
Dynamic collusion bounded functional encryption from identity-based encryption ⋮ Optimal bounded-collusion secure functional encryption ⋮ Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge ⋮ Unique-path identity based encryption with applications to strongly secure messaging ⋮ Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more ⋮ Generic Construction of Bounded-Collusion IBE via Table-Based ID-to-Key Map ⋮ Functional encryption for cubic polynomials and implementation ⋮ Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions ⋮ Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
This page was built for publication: Bounded-Collusion IBE from Key Homomorphism