scientific article; zbMATH DE number 1341866

From MaRDI portal
Publication:4263421

zbMath0964.94020MaRDI QIDQ4263421

Eiichiro Fujisaki, Tatsuaki Okamoto

Publication date: 22 September 1999


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (48)

A more efficient accountable authority IBE scheme under the DL assumptionThe KDM-CCA Security of REACTAn Efficient and Provably Secure Certificate-Based Encryption SchemeTightly secure ring-LWE based key encapsulation with short ciphertextsOn the Impossibility of Strong Encryption Over $\aleph_0$Using low-density parity-check codes to improve the McEliece cryptosystemNaor-Yung paradigm with shared randomness and applicationsAnonymous, robust post-quantum public key encryptionOnline-extractability in the quantum random-oracle modelModular Design of Role-Symmetric Authenticated Key Exchange ProtocolsSelective-Opening Security in the Presence of Randomness FailuresOn optimizing electricity markets performanceAn injectivity analysis of Crystals-Kyber and implications on quantum securityAttribute-Based Broadcast Encryption Scheme Made EfficientD-NTRU: more efficient and average-case IND-CPA secure NTRU variantExploring decryption failures of BIKE: new class of weak keys and key recovery attacksGeneric constructions of master-key KDM secure attribute-based encryptionRelationship between Two Approaches for Defining the Standard Model PA-nessPost-quantum key exchange for the Internet and the open quantum safe projectLattice-based cryptography: a surveyTightly CCA-secure encryption scheme in a multi-user setting with corruptionsNew technique for chosen-ciphertext security based on non-interactive zero-knowledgeAn efficient IND-CCA2 secure Paillier-based cryptosystemA note on an IND-CCA2 secure paillier-based cryptosystemTwo Generic Constructions of Probabilistic Cryptosystems and Their ApplicationsCramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker AssumptionA public-key encryption scheme based on non-linear indeterminate equationsComputational friendly attribute-based encryptions with short ciphertextNew chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problemNew designing of cryptosystems based on quadratic fieldsAutomated Proofs for Asymmetric EncryptionSecurity and Anonymity of Identity-Based Encryption with Multiple Trusted AuthoritiesA provably secure certificate-based encryption scheme against malicious CA attacks in the standard modelAn efficient and secure navigation protocol based on vehicular cloudStrongly Secure Certificateless Public Key Encryption Without PairingCCA security and trapdoor functions via key-dependent-message securityAn Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE TransformationsVerifiable Security of Boneh-Franklin Identity-Based EncryptionEfficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-CostNaor-Yung Paradigm with Shared Randomness and ApplicationsDirect chosen-ciphertext secure identity-based key encapsulation without random oraclesGeneralized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman ProblemA public key cryptosystem based on a subgroup membership problemConjugacy systems based on nonabelian factorization problems and their applications in cryptographyChosen ciphertext security from injective trapdoor functionsA performance evaluation of pairing-based broadcast encryption systemsRevocable hierarchical identity-based authenticated key exchangeGeneric transformation from broadcast encryption to round-optimal deniable ring authentication




This page was built for publication: