scientific article; zbMATH DE number 2009960
From MaRDI portal
Publication:4434880
zbMATH Open1037.68532MaRDI QIDQ4434880FDOQ4434880
Authors: Ran Canetti, Shai Halevi, Jonathan Katz
Publication date: 26 November 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560255.htm
Title of this publication is not available (Why is that?)
Recommendations
Cited In (only showing first 100 items - show all)
- Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security
- Title not available (Why is that?)
- KDM security for identity-based encryption: constructions and separations
- Efficient forward-secure threshold public key encryption
- Tightly secure (H)IBE in the random oracle model
- Forward-security under continual leakage
- Forward-secure revocable identity-based encryption
- Proactive secret sharing with constant communication
- Revisiting updatable encryption: controlled forward security, constructions and a puncturable perspective
- Computing on authenticated data
- Privacy-preserving encryption scheme using DNA parentage test
- Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)
- Forward-secure public key encryption without key update from proof-of-stake blockchain
- Identity-based encryption with hierarchical key-insulation in the standard model
- Doubly spatial encryption from DBDH
- Forward-secure revocable secret handshakes from lattices
- A survey on functional encryption
- Efficient updatable public-key encryption from lattices
- You can sign but not decrypt: hierarchical integrated encryption and signature
- Forward-Secure Group Signatures from Pairings
- Public-key puncturable encryption: modular and compact constructions
- Trapdoor delegation and HIBE from middle-product LWE in standard model
- Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications
- Non-interactive zero-knowledge from non-interactive batch arguments
- A note on non-interactive zero-knowledge from CDH
- Towards forward security properties for PEKS and IBE
- Anonymous (hierarchical) identity-based encryption from broader assumptions
- HIBE: hierarchical identity-based encryption
- Forward-secure encryption with fast forwarding
- Title not available (Why is that?)
- A lattice-based forward secure IBE scheme for Internet of things
- Multi-theorem preprocessing NIZKs from lattices
- Forward secure non-interactive key exchange
- Compact designated verifier NIZKs from the CDH assumption without pairings
- New constructions of statistical NIZKs: dual-mode DV-NIZKs and more
- Non-interactive zero knowledge from sub-exponential DDH
- Unique-path identity based encryption with applications to strongly secure messaging
- Reconfigurable cryptography: a flexible approach to long-term security
- Updatable public key encryption in the standard model
- Forward-Secure Group Encryptions from Lattices
- A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low
- Secret handshakes with dynamic expressive matching policy
- Functional encryption for set intersection in the multi-client setting
- Non-interactive zero-knowledge from LPN and MQ
- $$\text {Muckle}+$$: End-to-End Hybrid Authenticated Key Exchanges
- Towards secure asynchronous messaging with forward secrecy and mutual authentication
- Ciphertext-policy delegatable hidden vector encryption and its application to searchable encryption in multi-user setting
- Multi-identity management for identity-based cryptography
- NIZKs with maliciously chosen CRS: subversion advice-ZK and accountable soundness
- Public key encryption for the forgetful
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- Adaptively secure identity-based encryption from middle-product learning with errors
- Incremental symmetric puncturable encryption with support for unbounded number of punctures
- Disappearing cryptography in the bounded storage model
- Forward security under leakage resilience, revisited
- Generic forward-secure key agreement without signatures
- A lower bound on the key length of information-theoretic forward-secure storage schemes
- 0-RTT key exchange with full forward secrecy
- A forward-secure multi-receiver signcryption scheme
- Efficient hybrid encryption from ID-based encryption
- Bandwidth-efficient attribute-based key-insulated signatures with message recovery
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- Title not available (Why is that?)
- Title not available (Why is that?)
- An efficient IBE scheme with tight security reduction in the random oracle model
- Self-updatable encryption with short public parameters and its extensions
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
- Batch verification of short signatures
- Spatial encryption supporting non-monotone access structure
- Verifiable Random Functions from Identity-Based Key Encapsulation
- Title not available (Why is that?)
- Title not available (Why is that?)
- Privacy-preserving pattern matching on encrypted data
- A new framework for the design and analysis of identity-based identification schemes
- Attribute-based encryption with fast decryption
- Efficient selective identity-based encryption without random oracles
- Attribute-based encryption schemes with constant-size ciphertexts
- Formal Security Treatments for Signatures from Identity-Based Encryption
- IRIBE: intrusion-resilient identity-based encryption
- Key Insulation and Intrusion Resilience over a Public Channel
- How to construct secure proxy cryptosystem
- A cryptographic analysis of the TLS 1.3 handshake protocol
- Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
- Title not available (Why is that?)
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
- Provably-secure time-bound hierarchical key assignment schemes
- Fast, compact, and expressive attribute-based encryption
- Multi-Identity Single-Key Decryption without Random Oracles
- Attribute-based key-insulated signature and its applications
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Tightly secure signatures and public-key encryption
- On Forward-Secure Storage
- Theory of Cryptography
- Revocable hierarchical identity-based encryption with adaptive security
- A formal security analysis of the Signal messaging protocol
- Time-specific encryption from forward-secure encryption
- Forward-secure identity-based public-key encryption without random oracles
- A forward-secure public-key encryption scheme
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4434880)