scientific article; zbMATH DE number 2009960
From MaRDI portal
Publication:4434880
zbMATH Open1037.68532MaRDI QIDQ4434880FDOQ4434880
Authors: Ran Canetti, Shai Halevi, Jonathan Katz
Publication date: 26 November 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560255.htm
Title of this publication is not available (Why is that?)
Recommendations
Cited In (only showing first 100 items - show all)
- Efficient hybrid encryption from ID-based encryption
- Bandwidth-efficient attribute-based key-insulated signatures with message recovery
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- Title not available (Why is that?)
- Title not available (Why is that?)
- An efficient IBE scheme with tight security reduction in the random oracle model
- Self-updatable encryption with short public parameters and its extensions
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
- Batch verification of short signatures
- Spatial encryption supporting non-monotone access structure
- Verifiable Random Functions from Identity-Based Key Encapsulation
- Title not available (Why is that?)
- Title not available (Why is that?)
- Privacy-preserving pattern matching on encrypted data
- A new framework for the design and analysis of identity-based identification schemes
- Attribute-based encryption with fast decryption
- Efficient selective identity-based encryption without random oracles
- Attribute-based encryption schemes with constant-size ciphertexts
- Formal Security Treatments for Signatures from Identity-Based Encryption
- IRIBE: intrusion-resilient identity-based encryption
- Key Insulation and Intrusion Resilience over a Public Channel
- How to construct secure proxy cryptosystem
- A cryptographic analysis of the TLS 1.3 handshake protocol
- Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
- Title not available (Why is that?)
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
- Provably-secure time-bound hierarchical key assignment schemes
- Fast, compact, and expressive attribute-based encryption
- Multi-Identity Single-Key Decryption without Random Oracles
- Attribute-based key-insulated signature and its applications
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Tightly secure signatures and public-key encryption
- On Forward-Secure Storage
- Theory of Cryptography
- Revocable hierarchical identity-based encryption with adaptive security
- A formal security analysis of the Signal messaging protocol
- Time-specific encryption from forward-secure encryption
- Forward-secure identity-based public-key encryption without random oracles
- A forward-secure public-key encryption scheme
- Forward-secure identity-based signature: security notions and construction
- New forward-secure public-key encryption without random oracles
- Semi-adaptive security and bundling functionalities made generic and easy
- On secure ratcheting with immediate decryption
- Verifiable random functions: relations to identity-based key encapsulation and new constructions
- Certificateless signcryption scheme in the standard model
- Shorter identity-based encryption via asymmetric pairings
- Secure Key-Updating for Lazy Revocation
- Certifying trapdoor permutations, revisited
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
- Revocable hierarchical identity-based encryption via history-free approach
- Revocable hierarchical identity-based encryption with shorter private keys and update keys
- Forward secure message franking
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes
- Functional encryption for computational hiding in prime order groups via pair encodings
- Practical Identity-Based Encryption Without Random Oracles
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Anonymous HIBE with short ciphertexts: full security in prime order groups
- Efficient and Provably Secure Certificateless Multi-receiver Signcryption
- Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps
- One forward-secure signature scheme using bilinear maps and its applications
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency
- A forward-secure symmetric-key derivation protocol. How to improve classical DUKPT
- Forward-secure ID based digital signature scheme with forward-secure private key generator
- Towards tightly secure lattice short signature and id-based encryption
- Signatures in hierarchical certificateless cryptography: efficient constructions and provable security
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles
- Topics in Cryptology – CT-RSA 2004
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Title not available (Why is that?)
- KDM security for identity-based encryption: constructions and separations
- Tightly secure (H)IBE in the random oracle model
- HIBE: Hierarchical Identity-Based Encryption
- Forward-security under continual leakage
- Forward-secure revocable identity-based encryption
- Proactive secret sharing with constant communication
- Revisiting updatable encryption: controlled forward security, constructions and a puncturable perspective
- Computing on authenticated data
- Privacy-preserving encryption scheme using DNA parentage test
- Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)
- Forward-secure public key encryption without key update from proof-of-stake blockchain
- Identity-based encryption with hierarchical key-insulation in the standard model
- Doubly spatial encryption from DBDH
- Forward-secure revocable secret handshakes from lattices
- A survey on functional encryption
- Efficient updatable public-key encryption from lattices
- You can sign but not decrypt: hierarchical integrated encryption and signature
- Forward-Secure Group Signatures from Pairings
- Trapdoor delegation and HIBE from middle-product LWE in standard model
- Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications
- Non-interactive zero-knowledge from non-interactive batch arguments
- A note on non-interactive zero-knowledge from CDH
- Towards forward security properties for PEKS and IBE
- Anonymous (hierarchical) identity-based encryption from broader assumptions
- Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4434880)