Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
From MaRDI portal
Publication:3600515
Recommendations
- Identity-based authenticated encryption with identity confidentiality
- On the anonymity of identity-based encryption
- Anonymous Multireceiver Identity-Based Encryption
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
- A Framework for Identity-Based Encryption with Almost Tight Security
- Anonymous multi-receiver identity-based authenticated encryption with CCA security
- Traceable and Retrievable Identity-Based Encryption
- New Anonymity Notions for Identity-Based Encryption
- New Anonymity Notions for Identity-Based Encryption
Cites work
- scientific article; zbMATH DE number 1341866 (Why is no real title available?)
- scientific article; zbMATH DE number 2081087 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- Cryptography and Coding
- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
- Identity-based cryptosystems and signature schemes
- Multi-authority Attribute Based Encryption
- Practical Identity-Based Encryption Without Random Oracles
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Secure integration of asymmetric and symmetric encryption schemes
Cited in
(10)- On the anonymity of multi-receiver identity-based encryption based on Fujisaki-Okamoto transformation
- Registered attribute-based encryption
- Registration-based encryption: removing private-key generator from IBE
- Identity-based authenticated encryption with identity confidentiality
- Building Key-Private Public-Key Encryption Schemes
- Verifiable registration-based encryption
- The Boneh-Katz transformation, revisited: pseudorandom/obliviously-samplable PKE from lattices and codes and its application
- Simulation-based selective opening security for receivers under chosen-ciphertext attacks
- Broadcast encryption with multiple trust authorities
- Accountable Authority Identity-Based Encryption with Public Traceability
This page was built for publication: Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3600515)