Practical Identity-Based Encryption Without Random Oracles

From MaRDI portal
Publication:3593111

DOI10.1007/11761679_27zbMath1140.94340OpenAlexW1546774120MaRDI QIDQ3593111

Craig Gentry

Publication date: 24 September 2007

Published in: Advances in Cryptology - EUROCRYPT 2006 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11761679_27




Related Items

An efficient IBE scheme with tight security reduction in the random oracle modelGeneric construction for tightly-secure signatures from discrete logEfficient subtree-based encryption for fuzzy-entity data sharingExtended dual system group and shorter unbounded hierarchical identity based encryptionPredicate encryption supporting disjunctions, polynomial equations, and inner productsImplementing secure reporting of sexual misconduct -- revisiting WhoTooSemi-adaptive Security and Bundling Functionalities Made Generic and EasyRegular lossy functions and their applications in leakage-resilient cryptographyAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceMemory lower bounds of reductions revisitedAnother step towards realizing random oracles: non-malleable point obfuscationAnonymous IBE, leakage resilience and circular security from new assumptionsAn Efficient and Provably Secure Certificate-Based Encryption SchemeChosen ciphertext secure keyed-homomorphic public-key cryptosystemsImproved Identity-Based Online/Offline EncryptionConstructions of CCA-Secure Revocable Identity-Based EncryptionAccountable identity-based encryption with distributed private key generatorsEfficient revocable identity-based encryption with short public parametersOn the power of rewinding simulators in functional encryptionReducing elliptic curve logarithms to logarithms in a finite fieldAdaptively secure certificate-based broadcast encryption and its application to cloud storage serviceProxy-invisible CCA-secure type-based proxy re-encryption without random oraclesTightly CCA-secure identity-based encryption with ciphertext pseudorandomnessBroadcast encryption based non-interactive key distribution in MANETsBonsai trees, or how to delegate a lattice basisThe random oracle model: a twenty-year retrospectiveEfficient and fully secure lattice-based IBE with equality testForward-secure revocable identity-based encryptionEfficient Statically-Secure Large-Universe Multi-Authority Attribute-Based EncryptionTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionEfficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge SettingPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsIterated Random Oracle: A Universal Approach for Finding Loss in Security ReductionShorter identity-based encryption via asymmetric pairingsFormal Security Treatments for Signatures from Identity-Based EncryptionGeneric constructions of identity-based and certificateless kEMsEfficient One-Round Key Exchange in the Standard ModelRelations between semantic security and anonymity in identity-based encryptionCryptanalysis of an identity based broadcast encryption scheme without random oraclesInner-product encryption under standard assumptionsAccess control encryption with efficient verifiable sanitized decryptionIdentity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parametersAdaptively secure inner product encryption from LWEProgrammable hash functions and their applicationsAccountable authority key policy attribute-based encryptionRing-based identity based encryption -- asymptotically shorter MPK and tighter securityAdaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroupsNew Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public ParametersNew technique for chosen-ciphertext security based on non-interactive zero-knowledgeKDM security for identity-based encryption: constructions and separationsThe relation and transformation between hierarchical inner product encryption and spatial encryptionChosen ciphertext secure fuzzy identity based encryption without ROMGeneral Certificateless Encryption and Timed-Release EncryptionEfficient Certificate-Based Encryption in the Standard ModelEfficient selective identity-based encryption without random oraclesPublic key encryption with keyword search secure against keyword guessing attacks without random oracleForward-secure identity-based encryption with direct chosen-ciphertext security in the standard modelNew chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problemIRIBE: intrusion-resilient identity-based encryptionRobust encryptionChosen Ciphertext Secure Keyed-Homomorphic Public-Key EncryptionRevocable Identity-Based Encryption Revisited: Security Model and ConstructionChosen-ciphertext secure anonymous conditional proxy re-encryption with keyword searchAnonymous HIBE with short ciphertexts: full security in prime order groupsFully secure functional encryption with a large class of relations from the decisional linear assumptionA Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast CommunicationRevocable hierarchical identity-based encryptionEfficient hybrid encryption from ID-based encryptionProgrammable Hash Functions and Their ApplicationsMulti-Identity Single-Key Decryption without Random OraclesSecurity and Anonymity of Identity-Based Encryption with Multiple Trusted AuthoritiesFully CCA2 secure identity based broadcast encryption without random oraclesIdentity-Based Online/Offline EncryptionA provably secure certificate-based encryption scheme against malicious CA attacks in the standard modelNovel updatable identity-based hash proof system and its applicationsAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographyDéjà Q: Encore! Un Petit IBEFunctional Encryption Without ObfuscationNovel generic construction of leakage-resilient PKE scheme with CCA securityAdaptive-ID Secure Revocable Identity-Based EncryptionA variant of Boneh-Franklin IBE with a tight reduction in the random oracle modelVerifiable random functions: relations to identity-based key encapsulation and new constructionsAdaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE SchemeVerifiable Random Functions from Identity-Based Key EncapsulationOne-Round Strong Oblivious Signature-Based EnvelopeContent-Based EncryptionIdentity-Based Group EncryptionBuilding Key-Private Public-Key Encryption SchemesSearchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensionsCertified Encryption RevisitedEfficient adaptively-secure IB-KEMs and VRFs via near-collision resistanceIdentity-based encryption with security against the KGC: a formal model and its instantiationsRevocable identity-based encryption with server-aided ciphertext evolutionProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesDirect chosen-ciphertext secure identity-based key encapsulation without random oraclesNew Techniques for Dual System Encryption and Fully Secure HIBE with Short CiphertextsContinuous leakage-resilient identity-based encryption with leakage amplificationIBE with tight security against selective opening and chosen-ciphertext attacksEphemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environmentsBoneh-Boyen IBENew Proof for BKP IBE Scheme and Improvement in the MIMC SettingAdaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear GroupsLeakage-resilient identity-based cryptography from minimal assumptionsUnique-path identity based encryption with applications to strongly secure messagingCertificateless encryption scheme with provable security in the standard model suitable for mobile devicesIdentity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBEIdentity-based matchmaking encryption without random oraclesA Generic Construction of Integrated Secure-Channel Free PEKS and PKELeakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled CircuitsA survey on functional encryptionLattice-based programmable hash functions and applicationsComplementary set encryption for privacy-preserving data consolidationIdentity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext settingGeneric conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertextsIdentity-Based Broadcast Encryption with Constant Size Ciphertexts and Private KeysBlind Identity-Based Encryption and Simulatable Oblivious TransferTightly Secure IBE Under Constant-Size Master Public KeyGeneric constructions of integrated PKE and PEKSTighter security proofs for GPV-IBE in the quantum random oracle modelIdentity-Based Threshold Key-Insulated Encryption without Random OraclesCCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric EncryptionTightly secure hierarchical identity-based encryptionNew Anonymity Notions for Identity-Based EncryptionNew Anonymity Notions for Identity-Based EncryptionSanitizable Signatures RevisitedSecure Hierarchical Identity Based Encryption Scheme in the Standard Model



Cites Work


This page was built for publication: Practical Identity-Based Encryption Without Random Oracles