scientific article; zbMATH DE number 2009960
From MaRDI portal
Publication:4434880
Recommendations
Cited in
(only showing first 100 items - show all)- A lower bound on the key length of information-theoretic forward-secure storage schemes
- 0-RTT key exchange with full forward secrecy
- A forward-secure multi-receiver signcryption scheme
- Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security
- Efficient hybrid encryption from ID-based encryption
- Bandwidth-efficient attribute-based key-insulated signatures with message recovery
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- scientific article; zbMATH DE number 1980949 (Why is no real title available?)
- An efficient IBE scheme with tight security reduction in the random oracle model
- Self-updatable encryption with short public parameters and its extensions
- scientific article; zbMATH DE number 1962140 (Why is no real title available?)
- KDM security for identity-based encryption: constructions and separations
- scientific article; zbMATH DE number 2086699 (Why is no real title available?)
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
- Efficient forward-secure threshold public key encryption
- Spatial encryption supporting non-monotone access structure
- Batch verification of short signatures
- Tightly secure (H)IBE in the random oracle model
- Verifiable Random Functions from Identity-Based Key Encapsulation
- A new framework for the design and analysis of identity-based identification schemes
- Privacy-preserving pattern matching on encrypted data
- scientific article; zbMATH DE number 1962139 (Why is no real title available?)
- scientific article; zbMATH DE number 1418310 (Why is no real title available?)
- Efficient selective identity-based encryption without random oracles
- Attribute-based encryption schemes with constant-size ciphertexts
- Attribute-based encryption with fast decryption
- Forward-secure revocable identity-based encryption
- IRIBE: intrusion-resilient identity-based encryption
- Formal Security Treatments for Signatures from Identity-Based Encryption
- Forward-security under continual leakage
- Key Insulation and Intrusion Resilience over a Public Channel
- Proactive secret sharing with constant communication
- Revisiting updatable encryption: controlled forward security, constructions and a puncturable perspective
- How to construct secure proxy cryptosystem
- Computing on authenticated data
- Privacy-preserving encryption scheme using DNA parentage test
- A cryptographic analysis of the TLS 1.3 handshake protocol
- Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)
- Forward-secure public key encryption without key update from proof-of-stake blockchain
- Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
- Identity-based encryption with hierarchical key-insulation in the standard model
- Provably-secure time-bound hierarchical key assignment schemes
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
- scientific article; zbMATH DE number 2079936 (Why is no real title available?)
- Doubly spatial encryption from DBDH
- Attribute-based key-insulated signature and its applications
- Fast, compact, and expressive attribute-based encryption
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Tightly secure signatures and public-key encryption
- Forward-secure revocable secret handshakes from lattices
- Multi-Identity Single-Key Decryption without Random Oracles
- Revocable hierarchical identity-based encryption with adaptive security
- A survey on functional encryption
- A formal security analysis of the Signal messaging protocol
- On Forward-Secure Storage
- Theory of Cryptography
- Efficient updatable public-key encryption from lattices
- Time-specific encryption from forward-secure encryption
- Forward-Secure Group Signatures from Pairings
- You can sign but not decrypt: hierarchical integrated encryption and signature
- Forward-secure identity-based public-key encryption without random oracles
- A forward-secure public-key encryption scheme
- Trapdoor delegation and HIBE from middle-product LWE in standard model
- Public-key puncturable encryption: modular and compact constructions
- Forward-secure identity-based signature: security notions and construction
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications
- New forward-secure public-key encryption without random oracles
- Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption
- Non-interactive zero-knowledge from non-interactive batch arguments
- Verifiable random functions: relations to identity-based key encapsulation and new constructions
- Certificateless signcryption scheme in the standard model
- Semi-adaptive security and bundling functionalities made generic and easy
- On secure ratcheting with immediate decryption
- Shorter identity-based encryption via asymmetric pairings
- Towards forward security properties for PEKS and IBE
- A note on non-interactive zero-knowledge from CDH
- Anonymous (hierarchical) identity-based encryption from broader assumptions
- HIBE: hierarchical identity-based encryption
- Forward-secure encryption with fast forwarding
- Certifying trapdoor permutations, revisited
- scientific article; zbMATH DE number 5059240 (Why is no real title available?)
- A lattice-based forward secure IBE scheme for Internet of things
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
- Revocable hierarchical identity-based encryption via history-free approach
- Compact designated verifier NIZKs from the CDH assumption without pairings
- New constructions of statistical NIZKs: dual-mode DV-NIZKs and more
- Non-interactive zero knowledge from sub-exponential DDH
- Forward secure non-interactive key exchange
- Revocable hierarchical identity-based encryption with shorter private keys and update keys
- Multi-theorem preprocessing NIZKs from lattices
- Reconfigurable cryptography: a flexible approach to long-term security
- Updatable public key encryption in the standard model
- Unique-path identity based encryption with applications to strongly secure messaging
- Secret handshakes with dynamic expressive matching policy
- Forward-Secure Group Encryptions from Lattices
- A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low
- Functional encryption for set intersection in the multi-client setting
- Forward secure message franking
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4434880)