scientific article; zbMATH DE number 2009960
From MaRDI portal
Publication:4434880
Recommendations
Cited in
(only showing first 100 items - show all)- Forward-secure identity-based signature: security notions and construction
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
- Practical Identity-Based Encryption Without Random Oracles
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Key Insulation and Intrusion Resilience over a Public Channel
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
- On Forward-Secure Storage
- Time-specific encryption from forward-secure encryption
- How to construct secure proxy cryptosystem
- A new framework for the design and analysis of identity-based identification schemes
- Secure key-updating for lazy revocation
- Batch verification of short signatures
- Forward-secure ID based digital signature scheme with forward-secure private key generator
- Provably-secure time-bound hierarchical key assignment schemes
- New forward-secure public-key encryption without random oracles
- Attribute-based encryption schemes with constant-size ciphertexts
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Semi-adaptive security and bundling functionalities made generic and easy
- Theory of Cryptography
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes
- Towards tightly secure lattice short signature and id-based encryption
- Anonymous HIBE with short ciphertexts: full security in prime order groups
- On secure ratcheting with immediate decryption
- Signatures in hierarchical certificateless cryptography: efficient constructions and provable security
- Functional encryption for computational hiding in prime order groups via pair encodings
- A forward-secure symmetric-key derivation protocol. How to improve classical DUKPT
- Spatial encryption supporting non-monotone access structure
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
- Revocable hierarchical identity-based encryption via history-free approach
- Attribute-based encryption with fast decryption
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- Formal Security Treatments for Signatures from Identity-Based Encryption
- Verifiable Random Functions from Identity-Based Key Encapsulation
- Forward-secure identity-based public-key encryption without random oracles
- Revocable hierarchical identity-based encryption with adaptive security
- Shorter identity-based encryption via asymmetric pairings
- scientific article; zbMATH DE number 1962140 (Why is no real title available?)
- Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
- Fast, compact, and expressive attribute-based encryption
- Verifiable random functions: relations to identity-based key encapsulation and new constructions
- scientific article; zbMATH DE number 2086699 (Why is no real title available?)
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Certificateless signcryption scheme in the standard model
- Efficient and Provably Secure Certificateless Multi-receiver Signcryption
- Topics in Cryptology – CT-RSA 2004
- Multi-Identity Single-Key Decryption without Random Oracles
- scientific article; zbMATH DE number 2079936 (Why is no real title available?)
- Efficient hybrid encryption from ID-based encryption
- Revocable hierarchical identity-based encryption with shorter private keys and update keys
- A forward-secure public-key encryption scheme
- Attribute-based key-insulated signature and its applications
- Bandwidth-efficient attribute-based key-insulated signatures with message recovery
- scientific article; zbMATH DE number 1962139 (Why is no real title available?)
- A formal security analysis of the Signal messaging protocol
- scientific article; zbMATH DE number 1418310 (Why is no real title available?)
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- IRIBE: intrusion-resilient identity-based encryption
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps
- Privacy-preserving pattern matching on encrypted data
- Efficient selective identity-based encryption without random oracles
- One forward-secure signature scheme using bilinear maps and its applications
- An efficient IBE scheme with tight security reduction in the random oracle model
- Self-updatable encryption with short public parameters and its extensions
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
- Tightly secure signatures and public-key encryption
- Certifying trapdoor permutations, revisited
- A cryptographic analysis of the TLS 1.3 handshake protocol
- Forward secure message franking
- Forward-secure revocable secret handshakes from lattices
- Forward-secure encryption with fast forwarding
- Forward-Secure Group Signatures from Pairings
- Ciphertext-policy delegatable hidden vector encryption and its application to searchable encryption in multi-user setting
- Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- Non-interactive zero-knowledge from non-interactive batch arguments
- Non-interactive zero-knowledge from LPN and MQ
- Public key encryption for the forgetful
- $$\text {Muckle}+$$: End-to-End Hybrid Authenticated Key Exchanges
- Towards secure asynchronous messaging with forward secrecy and mutual authentication
- Forward secure non-interactive key exchange
- Compact designated verifier NIZKs from the CDH assumption without pairings
- Forward security under leakage resilience, revisited
- Towards forward security properties for PEKS and IBE
- New constructions of statistical NIZKs: dual-mode DV-NIZKs and more
- Forward-Secure Group Encryptions from Lattices
- Non-interactive zero knowledge from sub-exponential DDH
- Proactive secret sharing with constant communication
- Revisiting updatable encryption: controlled forward security, constructions and a puncturable perspective
- Efficient updatable public-key encryption from lattices
- Computing on authenticated data
- Privacy-preserving encryption scheme using DNA parentage test
- Forward-security under continual leakage
- Public-key puncturable encryption: modular and compact constructions
- Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)
- Forward-secure public key encryption without key update from proof-of-stake blockchain
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4434880)