An Identity Based Encryption Scheme Based on Quadratic Residues
From MaRDI portal
Publication:4550285
Recommendations
Cited in
(only showing first 100 items - show all)- Security-level switchable attribute-based encryption under the strictly weaker assumption family
- Multi-authority attribute-based encryption with honest-but-curious central authority
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- An efficient IBE scheme with tight security reduction in the random oracle model
- Identity Based Group Signatures from Hierarchical Identity-Based Encryption
- An ID-based cryptographic mechanisms based on GDLP and IFP
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
- Signature schemes with randomized verification
- Identity-based matchmaking encryption from standard assumptions
- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption
- Spatial encryption supporting non-monotone access structure
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Tightly secure (H)IBE in the random oracle model
- Comment on ``A strong provably secure IBE scheme without bilinear map by M. Zheng, Y. Xiang and H. Zhou
- Verifiable Random Functions from Identity-Based Key Encapsulation
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- An identity-based encryption scheme with compact ciphertexts
- Efficient selective identity-based encryption without random oracles
- Attribute-based encryption with fast decryption
- Identity-based signature scheme based on quadratic residues
- An applications of signed quadratic residues in public key cryptography
- CCA-secure identity-based matchmaking encryption from standard assumptions
- Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity
- Forward-secure revocable identity-based encryption
- IRIBE: intrusion-resilient identity-based encryption
- Formal Security Treatments for Signatures from Identity-Based Encryption
- Certificateless public key encryption with equality test
- An Identity-Based Key Agreement Protocol for the Network Layer
- An identity based threshold scheme
- Adequate elliptic curves for computing the product of \(n\) pairings
- Function-private functional encryption in the private-key setting
- scientific article; zbMATH DE number 6866298 (Why is no real title available?)
- Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey
- Fully secure functional encryption with a large class of relations from the decisional linear assumption
- Functional encryption for cascade automata
- A strong provably secure IBE scheme without bilinear map
- Functional encryption: origins and recent developments
- On Constructing Pairing-Free Identity-Based Encryptions
- Registration-based encryption: removing private-key generator from IBE
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding
- Minicrypt primitives with algebraic structure and applications
- Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions
- Bounded Collusion ABE for TMs from IBE
- Predicate encryption supporting disjunctions, polynomial equations, and inner products
- On the power of rewinding simulators in functional encryption
- Oblivious signature-based envelope
- Inner-product encryption under standard assumptions
- Verifiable Inner Product Encryption Scheme
- Identity-Based Cryptosystems and Quadratic Residuosity
- On the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptography
- One-round strong oblivious signature-based envelope
- Single-key to multi-key functional encryption with polynomial loss
- Boneh-Franklin IBE
- Efficient fully CCA-secure predicate encryptions from pair encodings
- A new approach to practical function-private inner product encryption
- A survey on functional encryption
- Identity oriented signature scheme based on quadratic residues
- Generalized learning problems and applications to non-commutative cryptography. (Extended abstract)
- New Anonymity Notions for Identity-Based Encryption
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Building Key-Private Public-Key Encryption Schemes
- Forward-secure identity-based signature: security notions and construction
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications
- Generic constructions of revocable identity-based encryption
- Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption
- Lattice-based programmable hash functions and applications
- Registered attribute-based encryption
- Fully CCA2 secure identity based broadcast encryption without random oracles
- Designing a secure e-tender submission protocol
- Bilinear entropy expansion from the decisional linear assumption
- Semi-adaptive security and bundling functionalities made generic and easy
- Lattice-based identity-based resplittable threshold public key encryption scheme
- Identity-based encryption in DDH hard groups
- Shorter identity-based encryption via asymmetric pairings
- An identity-based encryption scheme using isogeny of elliptic curves
- HIBE: hierarchical identity-based encryption
- Wildcarded identity-based encryption
- The relation and transformation between hierarchical inner product encryption and spatial encryption
- Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
- Generic constructions of integrated PKE and PEKS
- Beta Weil pairing revisited
- An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
- Functional encryption: deterministic to randomized functions from simple assumptions
- Extended dual system group and shorter unbounded hierarchical identity based encryption
- Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption
- Topology-hiding computation on all graphs
- Heuristics of the Cocks-Pinch method
- Dynamic collusion functional encryption and multi-authority attribute-based encryption
- Towards compact identity-based encryption on ideal lattices
- Functional encryption for cascade automata (extended abstract)
- Adaptively secure inner product encryption from LWE
- Verifiable registration-based encryption
- Secure administration of cryptographic role-based access control for large-scale cloud storage systems
- An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
This page was built for publication: An Identity Based Encryption Scheme Based on Quadratic Residues
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4550285)