scientific article; zbMATH DE number 2009960
From MaRDI portal
Publication:4434880
Recommendations
Cited in
(only showing first 100 items - show all)- Functional encryption for computational hiding in prime order groups via pair encodings
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Non-interactive zero-knowledge from LPN and MQ
- $$\text {Muckle}+$$: End-to-End Hybrid Authenticated Key Exchanges
- Towards secure asynchronous messaging with forward secrecy and mutual authentication
- Ciphertext-policy delegatable hidden vector encryption and its application to searchable encryption in multi-user setting
- Anonymous HIBE with short ciphertexts: full security in prime order groups
- Practical Identity-Based Encryption Without Random Oracles
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Multi-identity management for identity-based cryptography
- Efficient and Provably Secure Certificateless Multi-receiver Signcryption
- Public key encryption for the forgetful
- Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
- NIZKs with maliciously chosen CRS: subversion advice-ZK and accountable soundness
- Secure key-updating for lazy revocation
- Efficient subtree-based encryption for fuzzy-entity data sharing
- One forward-secure signature scheme using bilinear maps and its applications
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps
- A forward-secure symmetric-key derivation protocol. How to improve classical DUKPT
- Incremental symmetric puncturable encryption with support for unbounded number of punctures
- Disappearing cryptography in the bounded storage model
- Signatures in hierarchical certificateless cryptography: efficient constructions and provable security
- Forward-secure ID based digital signature scheme with forward-secure private key generator
- Adaptively secure identity-based encryption from middle-product learning with errors
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
- Towards tightly secure lattice short signature and id-based encryption
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles
- Topics in Cryptology – CT-RSA 2004
- Generic forward-secure key agreement without signatures
- Forward security under leakage resilience, revisited
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- A lower bound on the key length of information-theoretic forward-secure storage schemes
- 0-RTT key exchange with full forward secrecy
- A forward-secure multi-receiver signcryption scheme
- Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security
- Efficient hybrid encryption from ID-based encryption
- Bandwidth-efficient attribute-based key-insulated signatures with message recovery
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- scientific article; zbMATH DE number 1980949 (Why is no real title available?)
- An efficient IBE scheme with tight security reduction in the random oracle model
- Self-updatable encryption with short public parameters and its extensions
- scientific article; zbMATH DE number 1962140 (Why is no real title available?)
- KDM security for identity-based encryption: constructions and separations
- scientific article; zbMATH DE number 2086699 (Why is no real title available?)
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
- Efficient forward-secure threshold public key encryption
- Spatial encryption supporting non-monotone access structure
- Batch verification of short signatures
- Tightly secure (H)IBE in the random oracle model
- Verifiable Random Functions from Identity-Based Key Encapsulation
- A new framework for the design and analysis of identity-based identification schemes
- Privacy-preserving pattern matching on encrypted data
- scientific article; zbMATH DE number 1962139 (Why is no real title available?)
- scientific article; zbMATH DE number 1418310 (Why is no real title available?)
- Efficient selective identity-based encryption without random oracles
- Attribute-based encryption schemes with constant-size ciphertexts
- Attribute-based encryption with fast decryption
- Forward-secure revocable identity-based encryption
- IRIBE: intrusion-resilient identity-based encryption
- Formal Security Treatments for Signatures from Identity-Based Encryption
- Forward-security under continual leakage
- Key Insulation and Intrusion Resilience over a Public Channel
- Proactive secret sharing with constant communication
- Revisiting updatable encryption: controlled forward security, constructions and a puncturable perspective
- How to construct secure proxy cryptosystem
- Computing on authenticated data
- Privacy-preserving encryption scheme using DNA parentage test
- A cryptographic analysis of the TLS 1.3 handshake protocol
- Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)
- Forward-secure public key encryption without key update from proof-of-stake blockchain
- Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
- Identity-based encryption with hierarchical key-insulation in the standard model
- Provably-secure time-bound hierarchical key assignment schemes
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
- scientific article; zbMATH DE number 2079936 (Why is no real title available?)
- Doubly spatial encryption from DBDH
- Attribute-based key-insulated signature and its applications
- Fast, compact, and expressive attribute-based encryption
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Tightly secure signatures and public-key encryption
- Forward-secure revocable secret handshakes from lattices
- Multi-Identity Single-Key Decryption without Random Oracles
- Revocable hierarchical identity-based encryption with adaptive security
- A survey on functional encryption
- A formal security analysis of the Signal messaging protocol
- On Forward-Secure Storage
- Theory of Cryptography
- Efficient updatable public-key encryption from lattices
- Time-specific encryption from forward-secure encryption
- Forward-Secure Group Signatures from Pairings
- You can sign but not decrypt: hierarchical integrated encryption and signature
- Forward-secure identity-based public-key encryption without random oracles
- A forward-secure public-key encryption scheme
- Trapdoor delegation and HIBE from middle-product LWE in standard model
- Public-key puncturable encryption: modular and compact constructions
- Forward-secure identity-based signature: security notions and construction
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4434880)