Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme

From MaRDI portal
Publication:3627448

DOI10.1007/978-3-642-01001-9_24zbMath1239.94034OpenAlexW2097834299MaRDI QIDQ3627448

Mihir Bellare, Thomas Ristenpart

Publication date: 12 May 2009

Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_24



Related Items

Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesSequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oraclesPuncturable identity-based and attribute-based encryption from latticesShort signatures from Diffie-Hellman: realizing almost compact public keyLinearly homomorphic structure-preserving signatures and their applicationsDigital Signatures with Memory-Tight Security in the Multi-challenge SettingPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsMulti-client inner product encryption: function-hiding instantiations without random oraclesLattice-based signatures with tight adaptive corruptions and moreKey encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightnessLattice-based programmable hash functions and applicationsProgrammable hash functions and their applicationsRing-based identity based encryption -- asymptotically shorter MPK and tighter securityReflections on the security proofs of Boneh-Franklin identity-based encryption schemeAll-but-many encryptionNew chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problemVerifiable random functions from non-interactive witness-indistinguishable proofsCollusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard modelVerifiable Random Functions from Standard AssumptionsOn the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deploymentsSimulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE SchemeVerifiable Security of Boneh-Franklin Identity-Based EncryptionEfficient adaptively-secure IB-KEMs and VRFs via near-collision resistanceVerifiable random functions with optimal tightnessOptimal Security Proofs for Signatures from Identification SchemesDirect chosen-ciphertext secure identity-based key encapsulation without random oraclesAdaptively secure constrained pseudorandom functions in the standard modelShort identity-based signatures with tight security from lattices



Cites Work