New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters
From MaRDI portal
Publication:2975823
Recommendations
- Efficient revocable identity-based encryption with short public parameters
- Revocable identity-based encryption revisited: security model and construction
- Constructions of CCA-Secure Revocable Identity-Based Encryption
- CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance
- Generic constructions of revocable identity-based encryption
Cites work
- scientific article; zbMATH DE number 1842485 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Adaptive-ID secure revocable hierarchical identity-based encryption
- Advances in Cryptology - EUROCRYPT 2004
- Constructions of CCA-Secure Revocable Identity-Based Encryption
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Déjà Q: encore! Un petit IBE
- Efficient (anonymous) compact HIBE from standard assumptions
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient delegation of key generation and revocation functionalities in identity-based encryption
- Efficient revocable identity-based encryption via subset difference methods
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Pairing-Friendly Elliptic Curves of Prime Order
- Pairings for cryptographers
- Practical Identity-Based Encryption Without Random Oracles
- Revocable IBE systems with almost constant-size key update
- Revocable Identity-Based Encryption from Lattices
- Revocable hierarchical identity-based encryption
- Revocable hierarchical identity-based encryption via history-free approach
- Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
- Revocable identity-based encryption revisited: security model and construction
- Shorter identity-based encryption via asymmetric pairings
- Shorter quasi-adaptive NIZK proofs for linear subspaces
- Tools for simulating features of composite order bilinear groups in the prime order setting
- Variants of Waters' dual system primitives using asymmetric pairings. (Extended abstract)
Cited in
(18)- Efficient identity-based encryption with hierarchical key-insulation from HIBE
- Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
- Forward-secure revocable identity-based encryption
- Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
- Identity-based encryption with hierarchical key-insulation in the standard model
- Revocable hierarchical identity-based encryption with adaptive security
- Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more
- Generic constructions of revocable identity-based encryption
- Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption
- (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance
- Making the identity-based Diffie-Hellman key exchange efficiently revocable
- Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity
- Revocable attribute-based proxy re-encryption
- Efficient revocable identity-based encryption with short public parameters
- Revocable hierarchical identity-based encryption with shorter private keys and update keys
- Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order
- Revocable identity-based encryption with server-aided ciphertext evolution
- Revocable IBE with En-DKER from lattices: a novel approach for lattice basis delegation
This page was built for publication: New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2975823)