Revocable Identity-Based Encryption from Lattices
From MaRDI portal
Publication:2907387
DOI10.1007/978-3-642-31448-3_29zbMATH Open1308.94064OpenAlexW21280657MaRDI QIDQ2907387FDOQ2907387
Authors: Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Hoa Nguyen
Publication date: 7 September 2012
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-31448-3_29
Recommendations
- Server-aided revocable identity-based encryption from lattices
- Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance
- Simplified revocable hierarchical identity-based encryption from lattices
- Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more
- Simplified server-aided revocable identity-based encryption from lattices
- Revocable identity-based encryption from the computational Diffie-Hellman problem
- Generic constructions of revocable identity-based encryption
- Revocable identity-based encryption revisited: security model and construction
- Adaptive-ID secure revocable identity-based encryption from lattices via subset difference method
- Puncturable Identity-Based Encryption from Lattices
Cited In (37)
- Revocable identity-based encryption from the computational Diffie-Hellman problem
- Forward-secure revocable identity-based encryption
- Revocable predicate encryption from lattices
- Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
- Adaptive-ID secure revocable identity-based encryption from lattices via subset difference method
- Forward-secure revocable secret handshakes from lattices
- Server-aided revocable identity-based encryption from lattices
- Improved (hierarchical) inner-product encryption from lattices
- Revocable hierarchical identity-based encryption with adaptive security
- Efficient lattice (H)IBE in the standard model
- Revocable identity-based encryption revisited: security model and construction
- Puncturable Identity-Based Encryption from Lattices
- Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more
- Generic constructions of revocable identity-based encryption
- Server-aided revocable attribute-based encryption revised: multi-user setting and fully secure
- Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption
- (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance
- Simplified server-aided revocable identity-based encryption from lattices
- Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity
- Revocable identity-based encryption from codes with rank metric
- Scalable revocable identity-based signature over lattices in the standard model
- \(\mathrm{mR}_{\mathrm{LWE}}\)-CP-ABE: a revocable CP-ABE for post-quantum cryptography
- Revocable attribute-based proxy re-encryption
- Revocable hierarchical identity-based encryption via history-free approach
- A Secure Algorithm for Rounded Gaussian Sampling
- New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters
- Efficient identity-based encryption from LWR
- Simplified revocable hierarchical identity-based encryption from lattices
- Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices
- Revocable policy-based chameleon hash using lattices
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
- Revocable hierarchical identity-based encryption
- A practical implementation of identity-based encryption over NTRU lattices
- Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance
- Revocable IBE with En-DKER from lattices: a novel approach for lattice basis delegation
- Constructions of CCA-Secure Revocable Identity-Based Encryption
This page was built for publication: Revocable Identity-Based Encryption from Lattices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2907387)