Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
From MaRDI portal
Publication:3600515
DOI10.1007/978-3-540-85538-5_23zbMATH Open1186.94465OpenAlexW1601348745MaRDI QIDQ3600515FDOQ3600515
Authors: Kenneth G. Paterson, Sriramkrishnan Srinivasan
Publication date: 10 February 2009
Published in: Pairing-Based Cryptography – Pairing 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-85538-5_23
Recommendations
- Identity-based authenticated encryption with identity confidentiality
- On the anonymity of identity-based encryption
- Anonymous Multireceiver Identity-Based Encryption
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
- A Framework for Identity-Based Encryption with Almost Tight Security
- Anonymous multi-receiver identity-based authenticated encryption with CCA security
- Traceable and Retrievable Identity-Based Encryption
- New Anonymity Notions for Identity-Based Encryption
- New Anonymity Notions for Identity-Based Encryption
Cites Work
- Identity-based cryptosystems and signature schemes
- Practical Identity-Based Encryption Without Random Oracles
- Title not available (Why is that?)
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Title not available (Why is that?)
- Secure integration of asymmetric and symmetric encryption schemes
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Multi-authority Attribute Based Encryption
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- Title not available (Why is that?)
- Cryptography and Coding
- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
Cited In (10)
- Accountable Authority Identity-Based Encryption with Public Traceability
- On the anonymity of multi-receiver identity-based encryption based on Fujisaki-Okamoto transformation
- Registration-based encryption: removing private-key generator from IBE
- Building Key-Private Public-Key Encryption Schemes
- Simulation-based selective opening security for receivers under chosen-ciphertext attacks
- Registered attribute-based encryption
- The Boneh-Katz transformation, revisited: pseudorandom/obliviously-samplable PKE from lattices and codes and its application
- Broadcast encryption with multiple trust authorities
- Verifiable registration-based encryption
- Identity-based authenticated encryption with identity confidentiality
This page was built for publication: Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3600515)