Publication:4434880

From MaRDI portal


zbMath1037.68532MaRDI QIDQ4434880

Shai Halevi, Ran Canetti, Jonathan N. Katz

Publication date: 26 November 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560255.htm


94A60: Cryptography

68P25: Data encryption (aspects in computer science)


Related Items

Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security, Attribute-Based Encryption with Fast Decryption, 0-RTT Key Exchange with Full Forward Secrecy, Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, Identity-Based Threshold Key-Insulated Encryption without Random Oracles, Secure Hierarchical Identity Based Encryption Scheme in the Standard Model, A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low, Efficient and Provably Secure Certificateless Multi-receiver Signcryption, Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps, Multi-theorem preprocessing NIZKs from lattices, An efficient IBE scheme with tight security reduction in the random oracle model, Self-updatable encryption with short public parameters and its extensions, Tightly secure signatures and public-key encryption, An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem, Spatial encryption supporting non-monotone access structure, Shorter identity-based encryption via asymmetric pairings, Attribute-based encryption schemes with constant-size ciphertexts, Provably-secure time-bound hierarchical key assignment schemes, One forward-secure signature scheme using bilinear maps and its applications, Self-updatable encryption: time constrained access control with hidden attributes and better efficiency, Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model, Forward-secure identity-based signature: security notions and construction, Efficient selective identity-based encryption without random oracles, Signatures in hierarchical certificateless cryptography: efficient constructions and provable security, Attribute-based key-insulated signature and its applications, Verifiable random functions: relations to identity-based key encapsulation and new constructions, Certificateless signcryption scheme in the standard model, FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes, Revocable hierarchical identity-based encryption via history-free approach, A new framework for the design and analysis of identity-based identification schemes, Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions, Efficient subtree-based encryption for fuzzy-entity data sharing, Certifying trapdoor permutations, revisited, Revocable hierarchical identity-based encryption with shorter private keys and update keys, Functional encryption for computational hiding in prime order groups via pair encodings, New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem, IRIBE: intrusion-resilient identity-based encryption, Batch verification of short signatures, Forward-secure ID based digital signature scheme with forward-secure private key generator, A formal security analysis of the Signal messaging protocol, KDM security for identity-based encryption: constructions and separations, Doubly spatial encryption from DBDH, Anonymous HIBE with short ciphertexts: full security in prime order groups, Efficient hybrid encryption from ID-based encryption, Bandwidth-efficient attribute-based key-insulated signatures with message recovery, An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem, Computing on authenticated data, Privacy-preserving encryption scheme using DNA parentage test, How to construct secure proxy cryptosystem, Identity-based encryption with hierarchical key-insulation in the standard model, Protecting against key-exposure: strongly key-insulated encryption with optimal threshold, Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts, Secret Handshakes with Dynamic Expressive Matching Policy, Towards Tightly Secure Lattice Short Signature and Id-Based Encryption, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting, Semi-adaptive Security and Bundling Functionalities Made Generic and Easy, Towards Forward Security Properties for PEKS and IBE, Forward-Secure Group Signatures from Pairings, New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, Formal Security Treatments for Signatures from Identity-Based Encryption, Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures, Practical Identity-Based Encryption Without Random Oracles, Multi-Identity Single-Key Decryption without Random Oracles, Multi-identity management for identity-based cryptography, Adaptive-ID Secure Revocable Identity-Based Encryption, Key Insulation and Intrusion Resilience over a Public Channel, Verifiable Random Functions from Identity-Based Key Encapsulation