Identity-Based Cryptosystems and Signature Schemes

From MaRDI portal
Publication:2974478

DOI10.1007/3-540-39568-7_5zbMath1359.94626OpenAlexW1569083856MaRDI QIDQ2974478

Adi Shamir

Publication date: 10 April 2017

Published in: Advances in Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-39568-7_5



Related Items

Adaptive Simulation Security for Inner Product Functional Encryption, Verifiable Inner Product Encryption Scheme, Almost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and More, A more efficient accountable authority IBE scheme under the DL assumption, A strongly secure identity-based authenticated group key exchange protocol, Cocks IBE Scheme, Boneh-Franklin IBE, Sakai-Kasahara IBE, HIBE: Hierarchical Identity-Based Encryption, Attribute-Based Encryption, New Proof for BKP IBE Scheme and Improvement in the MIMC Setting, Efficient Certificate-Based Signature and Its Aggregation, An efficient ID-based user identification scheme for mutual authentication in mobile environments, Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves, Unconditionally Anonymous Controllable ID-Based Ring Signatures, Constructing ID-based cryptographic technique for IFP and GDLP based cryptosystem, A Novel Certificateless Multi-signature Scheme over NTRU Lattices, Bounded Collusion ABE for TMs from IBE, Quantum attribute-based encryption: a comprehensive study, A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption, Registered attribute-based encryption, Unique-path identity based encryption with applications to strongly secure messaging, (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin, Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey, Identity-based encryption in DDH hard groups, Locally verifiable signature and key aggregation, On Constructing Pairing-Free Identity-Based Encryptions, On the impossibility of algebraic vector commitments in pairing-free groups, Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance, A Pairing-free Provable Secure and Efficient Identity-based Identification Scheme with Anonymity, Certificateless encryption scheme with provable security in the standard model suitable for mobile devices, Multi-client functional encryption with fine-grained access control, Traceable receipt-free encryption, Identity-based matchmaking encryption from standard assumptions, Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE, Identity-based signature and extended forking algorithm in the multivariate quadratic setting, Identity-based matchmaking encryption without random oracles, Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption, Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding, A survey on functional encryption, New versions of Miller-loop secured against side-channel attacks, Lower bounds for the number of decryption updates in registration-based encryption, Efficient IBS from a new assumption in the multivariate-quadratic setting, Simplified server-aided revocable identity-based encryption from lattices, Spatial encryption revisited: from delegatable multiple inner product encryption and more, An orderly quantum multi-signature based on orthogonal product states for the multi-party transaction blockchain, Various matching keys for asymmetric topology encryption, Lattice-based programmable hash functions and applications, Maravedí: a secure and practical protocol to trade risk for instantaneous finality, A lattice-based forward secure IBE scheme for Internet of things, Design of a Certificateless Designated Server Based Searchable Public Key Encryption Scheme, Efficient identity-based public-key quantum signature scheme, Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, Blind Identity-Based Encryption and Simulatable Oblivious Transfer, Algebraic curves and cryptography, A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography, Access Control Encryption for Equality, Comparison, and More, Tightly Secure IBE Under Constant-Size Master Public Key, Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions, Fine-grained secure attribute-based encryption, Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures, Proxy Signatures Secure Against Proxy Key Exposure, Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption, Multi-key Hierarchical Identity-Based Signatures, Simple and generic constructions of succinct functional encryption, Authenticated Key Exchange with Entities from Different Settings and Varied Groups, On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki–Okamoto Transformation, Algebraic Attacks Against Several Weak Variants of GVW’13 ABE, Functional Encryption for Cascade Automata (Extended Abstract), Proxy Re-signature Schemes Without Random Oracles, Public Key Encryption with Searchable Keywords Based on Jacobi Symbols, Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles, Efficient ID-Based Digital Signatures with Message Recovery, Strongly Secure Certificateless Public Key Encryption Without Pairing, Identity-Based Threshold Key-Insulated Encryption without Random Oracles, CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption, Tightly secure hierarchical identity-based encryption, An efficient certificateless multi-receiver threshold decryption scheme, An identity-based strong designated verifier proxy signature scheme, An identity-based strong designated verifier proxy signature scheme, An identity-based strong designated verifier proxy signature scheme, Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption, New Anonymity Notions for Identity-Based Encryption, New Anonymity Notions for Identity-Based Encryption, Efficient and Short Certificateless Signature, On the Security of Online/Offline Signatures and Multisignatures from ACISP’06, A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks, Secure Hierarchical Identity Based Encryption Scheme in the Standard Model, Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority, The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version, Unnamed Item, Digital Signatures, Real Hidden Identity-Based Signatures, CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution, Pairing-based cryptography on elliptic curves, Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability, Private authentication, Efficient subtree-based encryption for fuzzy-entity data sharing, Impossibility of simulation secure functional encryption even with random oracles, Registration-based encryption: removing private-key generator from IBE, Two attacks on rank metric code-based schemes: RankSign and an IBE scheme, Fine-grained secure attribute-based encryption, Provably secure and pairing-based strong designated verifier signature scheme with message recovery, Provably secure pairing-free identity-based partially blind signature scheme and its application in online E-cash system, SoK: securing email -- a stakeholder-based analysis, Optimizing registration based encryption, Anonymous IBE, leakage resilience and circular security from new assumptions, An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem, Public-key quantum digital signature scheme with one-time pad private-key, Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing, Mathematical problems in cryptology, Generic constructions for fully secure revocable attribute-based encryption, Dynamic collusion bounded functional encryption from identity-based encryption, Revocable hierarchical identity-based encryption with shorter private keys and update keys, From cryptomania to obfustopia through secret-key functional encryption, Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing, Bonsai trees, or how to delegate a lattice basis, KCI-resilient anonymous wireless link-layer authentication protocols, Functional encryption for computational hiding in prime order groups via pair encodings, Forward-secure ID based digital signature scheme with forward-secure private key generator, Anonymous certificate-based broadcast encryption with constant decryption cost, E-passport EAC scheme based on identity-based cryptography, Security weaknesses of authenticated key agreement protocols, A new key authentication scheme based on discrete logarithms, Provably secure certificate-based encryption with leakage resilience, Relations between semantic security and anonymity in identity-based encryption, Cryptanalysis of an identity based broadcast encryption scheme without random oracles, Dual trapdoor identity-based encryption with keyword search, Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing, Practical fully secure unrestricted inner product functional encryption modulo \(p\), Identity-based aggregate signcryption in the standard model from multilinear maps, Efficient identity-based threshold decryption scheme from bilinear pairings, A lattice-based identity-based proxy blind signature scheme in the standard model, Certificateless proxy signature from RSA, Strongly secure certificateless signature scheme supporting batch verification, Certificateless public key encryption scheme with hybrid problems and its application to Internet of things, Cryptanalysis and improvement of three certificateless aggregate signature schemes, A novel ID-based group signature, Functional encryption for randomized functionalities in the private-key setting from minimal assumptions, Function-private functional encryption in the private-key setting, An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks, A provable authenticated group key agreement protocol for mobile environment, Identity-based quotable ring signature, New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem, IRIBE: intrusion-resilient identity-based encryption, A certificateless ring signature scheme with high efficiency in the random oracle model, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions, New point compression method for elliptic \(\mathbb{F}_{q^2}\)-curves of \(j\)-invariant 0, Attacks on Okamoto and Tanaka's one-way ID-based key distribution system, Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing, Leakage-resilient group signature: definitions and constructions, Digital signature with message recovery using self-certified public keys without trustworthy system authority, New identity-based society oriented signature schemes from pairings on elliptic curves, New public-key quantum signature scheme with quantum one-way function, Functional encryption for cascade automata, Revocable hierarchical identity-based encryption, Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability, Fully CCA2 secure identity based broadcast encryption without random oracles, Security of self-certified signatures, A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges, Policy controlled system with anonymity, Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity, A note on Girault's self-certified model, A secure identity-based proxy multi-signature scheme, Breaking the short certificateless signature scheme, A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model, Certificateless two-party authenticated key agreement scheme for smart grid, Generic construction of server-aided revocable hierarchical identity-based encryption, Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption, Designing a secure e-tender submission protocol, Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions, Master-key KDM-secure ABE via predicate encoding, Generic negation of pair encodings, Steel: composable hardware-based stateful and randomised functional encryption, Identity-based encryption with security against the KGC: a formal model and its instantiations, Perfectly secure key distribution for dynamic conferences, Security proofs for identity-based identification and signature schemes, Universal forgery on a group signature scheme using self-certified public keys, Identity-based authenticated encryption with identity confidentiality, Wildcarded identity-based encryption from lattices, Efficient fully CCA-secure predicate encryptions from pair encodings, Threshold verification scheme to a valid-signature using identity only on specialized approval, Direct chosen-ciphertext secure identity-based key encapsulation without random oracles, A new identity-based multivariate signature scheme, Self-certified multi-proxy signature schemes with message recovery, Verifiable registration-based encryption, Dynamic decentralized functional encryption, Post-quantum ID-based ring signatures from symmetric-key primitives, Using smart cards to authenticate remote passwords, ID-based multisignatures with distinguished signing authorities for sequential and broadcasting architectures, An efficient certificate-based signature scheme in the standard model, Implementation of lattice trapdoors on modules and applications, Short identity-based signatures with tight security from lattices, An efficient IBE scheme with tight security reduction in the random oracle model, On the security of two identity-based signature schemes based on pairings, Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing, Comment on ``A strong provably secure IBE scheme without bilinear map by M. Zheng, Y. Xiang and H. Zhou, (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps, Provably secure certificateless proxy signature scheme in the standard model, Twin-Beth: security under active and concurrent attacks for the Beth identity-based identification scheme, Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode, Distributed ring signatures from general dual access structures, On the security of two identity-based conditional proxy re-encryption schemes, Identity-based key distribution for mobile ad hoc networks, Simulatability and security of certificateless threshold signatures, Certificate-based signcryption with enhanced security features, An efficient certificateless two-party authenticated key agreement protocol, An ID-based authenticated dynamic group key agreement with optimal round, A provable secure fuzzy identity based signature scheme, An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices, Linearly homomorphic structure-preserving signatures and their applications, Distributed certificateless key encapsulation mechanism secure against the adaptive adversary, An improved ring signature scheme without trusted key generation center for wireless sensor network, An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem, A survey of fault attacks in pairing based cryptography, Shorter identity-based encryption via asymmetric pairings, Certificateless key-insulated signature without random oracles, Breaking an ID-based encryption based on discrete logarithm and factorization problems, Certificateless threshold signature scheme from bilinear maps, Provably secure identity-based authenticated key agreement protocols with malicious private key generators, Forward-secure identity-based signature: security notions and construction, Identity-based threshold decryption on access structure, Identity-based key-insulated proxy signature without random oracles, Certificateless strong key-insulated signature without random oracles, Certificateless message recovery signatures providing Girault's level-3 security, A new two-round certificateless authenticated key agreement protocol without bilinear pairings, An improved two-party identity-based authenticated key agreement protocol using pairings, Certificateless public key encryption: a new generic construction and two pairing-free schemes, A note on an identity-based ring signature scheme with signer verifiability, Attribute-based encryption schemes with constant-size ciphertexts, Identity-based chameleon hashing and signatures without key exposure, Delegation of signing rights using certificateless proxy signatures, A round-optimal three-party ID-based authenticated key agreement protocol, Revocable hierarchical identity-based encryption via history-free approach, Group-oriented fair exchange of signatures, Group-oriented setting's multisigncryption scheme with threshold designcryption, Provably secure one-round identity-based authenticated asymmetric group key agreement protocol, A new provably secure certificateless short signature scheme, One-round identity-based key exchange with perfect forward security, An efficient dynamic authenticated key exchange protocol with selectable identities, Accountable authority key policy attribute-based encryption, Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups, Efficient certificateless proxy signature scheme with provable security, An ID-based cryptographic mechanisms based on GDLP and IFP, An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments, Identity-based partially blind signature in the standard model for electronic cash, An efficient identity based generalized signcryption scheme, Creation of identity-based digital signature schemes from bilinear maps, Identity-based broadcast encryption with shorter transmissions, Chosen ciphertext secure fuzzy identity based encryption without ROM, Analysis and improvement of authenticatable ring signcryption scheme, Efficient selective identity-based encryption without random oracles, An ID-based signcryption scheme with compartmented secret sharing for unsigncryption, An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem, Private key agreement and secure communication for heterogeneous sensor networks, Certificateless threshold signature secure in the standard model, Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model, Certificate-based proxy decryption systems with revocability in the standard model, A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols, Security and efficiency data sharing scheme for cloud storage, Security analysis of an identity-based strongly unforgeable signature scheme, Certificateless one-pass and two-party authenticated key agreement protocol and its extensions, Strongly full-hiding inner product encryption, Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model, Verifiability-based conversion from CPA to CCA-secure predicate encryption, A new framework for the design and analysis of identity-based identification schemes, Cryptanalysis and improvement of a certificateless aggregate signature scheme, Security models for certificateless signature schemes revisited, Self-generated-certificate public key encryption without pairing and its application, Key updating technique in identity-based encryption, Efficient certificateless threshold signatures without random oracles, An ID-based multi-signer universal designated multi-verifier signature scheme, On the security of public key cryptosystems with a double decryption mechanism, Hidden attribute-based signatures without anonymity revocation, Provable secure identity based generalized signcryption scheme, Generic construction of designated tester public-key encryption with keyword search, Secure threshold multi authority attribute based encryption without a central authority, Certificateless cryptography with KGC trust level 3, Certificate-free \textit{ad hoc} anonymous authentication, Insecurity of an efficient certificateless aggregate signature with constant pairing computations, Symmetric threshold multipath (STM): an online symmetric key management scheme, Signatures in hierarchical certificateless cryptography: efficient constructions and provable security, Certificateless proxy multi-signature, Attribute-based key-insulated signature and its applications, Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts, On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups, A strong provably secure IBE scheme without bilinear map, Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism, Verifiable random functions: relations to identity-based key encapsulation and new constructions, Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol, An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment, Anonymous certificateless multi-receiver encryption scheme for smart community management systems, Black-box constructions of signature schemes in the bounded leakage setting, Extended dual system group and shorter unbounded hierarchical identity based encryption, LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication, Predicate encryption supporting disjunctions, polynomial equations, and inner products, Certificateless signature: a new security model and an improved generic construction, Survey of information security, An efficient signcryption for data access control in cloud computing, Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited, Efficient revocable identity-based encryption via subset difference methods, A general framework for secure sharing of personal health records in cloud system, Scalable revocable identity-based signature over lattices in the standard model, Forgery attacks on two provably secure certificateless signature schemes, On the power of rewinding simulators in functional encryption, Anonymous and leakage resilient IBE and IPE, Attribute-based fine-grained access control for outscored private set intersection computation, Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness, An efficient RSA-based certificateless public key encryption scheme, Blind key-generation attribute-based encryption for general predicates, A novel pairing-free certificateless authenticated key agreement protocol with provable security, Cryptanalysis and improvement of a certificateless encryption scheme in the standard model, A novel identity-based multi-signature scheme over NTRU lattices, A generic construction of tightly secure signatures in the multi-user setting, Algorand: a secure and efficient distributed ledger, Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information, A pairing-free and provably secure certificateless signature scheme, An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks, Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction, Certificateless public key encryption with equality test, Wildcarded identity-based encryption, Provably secure certificate-based proxy blind signature scheme from pairings, Inner-product functional encryption with fine-grained access control, Unbounded HIBE with tight security, Tightly CCA-secure encryption scheme in a multi-user setting with corruptions, Multi-party functional encryption, Ring-based identity based encryption -- asymptotically shorter MPK and tighter security, On the impossibility of purely algebraic signatures, Identification scheme and forward-secure signature in identity-based setting from isogenies, Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme, Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions, Tight security for the generic construction of identity-based signature (in the multi-instance setting), Security-level switchable attribute-based encryption under the strictly weaker assumption family, Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage, Unrestricted and compact certificateless aggregate signature scheme, On the security of a modified Beth identity-based identification scheme, Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more, An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries, Improvement on Meshram et al.'s ID-based cryptographic mechanism, Security weaknesses of a signature scheme and authenticated key agreement protocols, Provably secure certificate-based signature scheme without pairings, An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice, Two new identity-based threshold ring signature schemes, Provable certificateless generalized signcryption scheme, The relation and transformation between hierarchical inner product encryption and spatial encryption, Certificateless signature scheme with security enhanced in the standard model, An efficient certificateless proxy signature scheme without pairing, Secure identity-based signcryption in the standard model, Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity, Trapdoor delegation and HIBE from middle-product LWE in standard model, Certificateless threshold cryptosystem secure against chosen-ciphertext attack, Identity-based ring signatures from RSA, Certificateless undeniable signature scheme, Provably secure non-interactive key distribution based on pairings, On the security of efficient user identification scheme, Simulatable certificateless two-party authenticated key agreement protocol, Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism, Protecting against key-exposure: strongly key-insulated encryption with optimal threshold, Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts, Identity based blind signature scheme over NTRU lattices, Strongly secure identity-based authenticated key agreement protocols without bilinear pairings, Reconfigurable Cryptography: A Flexible Approach to Long-Term Security, Déjà Q: Encore! Un Petit IBE, Identity-based proxy re-signatures from lattices, On the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptography, Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups, Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing, An improved certificateless strong key-insulated signature scheme in the standard model, Identity-based quantum designated verifier signature, Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits, Leakage-Resilient Functional Encryption via Pair Encodings, Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance, Content-Based Encryption, Revocable identity-based encryption with server-aided ciphertext evolution, A fully distributed hierarchical attribute-based encryption scheme, Identity-based signatures in standard model, A new approach to practical function-private inner product encryption, An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem, Ephemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environments, Lattice-based revocable certificateless signature, Efficient nonce-based remote user authentication scheme using smart cards, Cryptanalysis and improvement of the Tzeng-Hwang authenticated encryption scheme based on elliptic curve discrete logarithm problem, Identity based designated multi-confirmer signature: a new type signature, Identity based group-oriented undeniable signature scheme, Cryptanalysis of some signature schemes with message recovery, ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings, Identity oriented signature scheme based on quadratic residues, Several security schemes constructed using ECC-based self-certified public key cryptosystems, A rational threshold signature model and protocol based on different permissions, Time-and-ID-based proxy reencryption scheme, Comments on ID-based multi-signature with distinguished signing authorities, Efficient proxy signature schemes using self-certified public keys, Privacy-preserving encryption scheme using DNA parentage test, Identity-based re-encryption scheme with lightweight re-encryption key generation, An efficient and secure identity based multiple signatures scheme based on RSA, Multi-authority attribute-based encryption with honest-but-curious central authority, A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model, Generic Constructions of Revocable Identity-Based Encryption, A Pairing-Less Identity-Based Blind Signature with Message Recovery Scheme for Cloud-Assisted Services, Improvement of identity-based threshold proxy signature scheme with known signers, Modeling Distributed Private Key Generation by Composing Petri Nets, Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions, Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption, Semi-adaptive Security and Bundling Functionalities Made Generic and Easy, From Cryptomania to Obfustopia Through Secret-Key Functional Encryption, Single-Key to Multi-Key Functional Encryption with Polynomial Loss, Certificateless ring signature based on RSA problem and DL problem, Improved Identity-Based Online/Offline Encryption, Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes, Private Certificate-Based Remote Data Integrity Checking in Public Clouds, Reducing elliptic curve logarithms to logarithms in a finite field, On the Anonymization of Cocks IBE Scheme, Key-Policy Multi-authority Attribute-Based Encryption, Unnamed Item, Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption, Adaptive Oblivious Transfer and Generalization, Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting, Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps, Towards Certificate-Based Group Encryption, CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts, Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks, Two Notes on the Security of Certificateless Signatures, A Provably Secure Ring Signature Scheme in Certificateless Cryptography, Formal Security Treatments for Signatures from Identity-Based Encryption, An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model, A new certificateless multiple key agreement scheme, Identity-Based Blind Signature from Lattices in Standard Model, General Certificateless Encryption and Timed-Release Encryption, Efficient Certificate-Based Encryption in the Standard Model, An Identity-Based Key Agreement Protocol for the Network Layer, Certificate-Based Signature Schemes without Pairings or Random Oracles, Compact Inner Product Encryption from LWE, Compact Hierarchical IBE from Lattices in the Standard Model, SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption, Authenticated Group Key Agreement Protocol Without Pairing, Simplified Revocable Hierarchical Identity-Based Encryption from Lattices, Generic Construction of Bounded-Collusion IBE via Table-Based ID-to-Key Map, Applications of Signcryption, Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security, Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources, Self-organized Anonymous Authentication in Mobile Ad Hoc Networks, Adaptively Secure Non-interactive Threshold Cryptosystems, Functional Encryption: Origins and Recent Developments, Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications, Attribute-Based Encryption with Fast Decryption, Identity-based authenticated key agreement protocol based on Weil pairing, A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract), Identity Based Public Verifiable Signcryption Scheme, Practical Identity-Based Encryption Without Random Oracles, Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility, An Efficient ID-Based Proxy Signature Scheme from Pairings, Multi-Identity Single-Key Decryption without Random Oracles, Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption, Generalized Identity Based and Broadcast Encryption Schemes, One-Round ID-Based Blind Signature Scheme without ROS Assumption, Tracing Malicious Proxies in Proxy Re-encryption, Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities, Identity-Based Online/Offline Encryption, Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures, Attribute-Based Signatures, A Privacy-Preserving ID-Based Group Key Agreement Scheme Applied in VPAN, Adaptive-ID Secure Revocable Identity-Based Encryption, An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations, Universally Anonymous IBE Based on the Quadratic Residuosity Assumption, Certificate-Based Generalized Ring Signcryption Scheme, Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts), Verifiable Random Functions from Identity-Based Key Encapsulation, ID-Based Blind Signature and Proxy Blind Signature without Trusted PKG, Identity-Based Group Encryption, Linear Encryption with Keyword Search, What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?, Building Key-Private Public-Key Encryption Schemes, A Schnorr-Like Lightweight Identity-Based Signature Scheme, Certified Encryption Revisited, Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems, A Lattice-Based Group Signature Scheme with Message-Dependent Opening, Verifiable Security of Boneh-Franklin Identity-Based Encryption, Efficient Identity-Based Signcryption in the Standard Model, Identity-Based Trace and Revoke Schemes, Generalized Learning Problems and Applications to Non-commutative Cryptography, Identity Based Group Signatures from Hierarchical Identity-Based Encryption, Identity-Based Deterministic Signature Scheme without Forking-Lemma, Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes, Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, Generic Construction of Stateful Identity Based Encryption, Authenticated Byzantine Generals in Dual Failure Model, A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme, New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, AN IDENTITY-BASED ENCRYPTION SCHEME USING ISOGENY OF ELLIPTIC CURVES, Unnamed Item, Unnamed Item, A conference key distribution system, Formal Language Identity-based Cryptography