An Identity Based Encryption Scheme Based on Quadratic Residues
From MaRDI portal
Publication:4550285
Recommendations
Cited in
(only showing first 100 items - show all)- Forward-secure identity-based signature: security notions and construction
- Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding
- Predicate encryption supporting disjunctions, polynomial equations, and inner products
- Single-key to multi-key functional encryption with polynomial loss
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Comment on ``A strong provably secure IBE scheme without bilinear map by M. Zheng, Y. Xiang and H. Zhou
- Dynamic collusion bounded functional encryption from identity-based encryption
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
- On Constructing Pairing-Free Identity-Based Encryptions
- Bilinear entropy expansion from the decisional linear assumption
- A new general framework for secure public key encryption with keyword search
- Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
- Revocable identity-based encryption with server-aided ciphertext evolution
- Forward-secure ID based digital signature scheme with forward-secure private key generator
- Fine-grained secure attribute-based encryption
- Bonsai trees, or how to delegate a lattice basis
- Functional encryption: origins and recent developments
- Identity Based Group Signatures from Hierarchical Identity-Based Encryption
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Semi-adaptive security and bundling functionalities made generic and easy
- Registration-based encryption: removing private-key generator from IBE
- Identity-based ring signatures from RSA
- Fully CCA2 secure identity based broadcast encryption without random oracles
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- On the power of rewinding simulators in functional encryption
- Functional encryption for computational hiding in prime order groups via pair encodings
- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
- Spatial encryption supporting non-monotone access structure
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
- Attribute-based encryption with fast decryption
- Anonymous IBE, leakage resilience and circular security from new assumptions
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- Formal Security Treatments for Signatures from Identity-Based Encryption
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Verifiable Random Functions from Identity-Based Key Encapsulation
- Fine-grained secure attribute-based encryption
- Shorter identity-based encryption via asymmetric pairings
- Relations between semantic security and anonymity in identity-based encryption
- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption
- Inner-product encryption under standard assumptions
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- scientific article; zbMATH DE number 2222192 (Why is no real title available?)
- Identity oriented signature scheme based on quadratic residues
- Designing a secure e-tender submission protocol
- A strong provably secure IBE scheme without bilinear map
- An Identity-Based Key Agreement Protocol for the Network Layer
- Oblivious signature-based envelope
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Certificateless public key encryption with equality test
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
- IRIBE: intrusion-resilient identity-based encryption
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Function-private functional encryption in the private-key setting
- Optimal security notion for decentralized multi-client functional encryption
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- An identity-based encryption scheme with compact ciphertexts
- Efficient selective identity-based encryption without random oracles
- Identity-based signature scheme based on quadratic residues
- A new approach to practical function-private inner product encryption
- An efficient IBE scheme with tight security reduction in the random oracle model
- Verifiability-based conversion from CPA to CCA-secure predicate encryption
- The relation and transformation between hierarchical inner product encryption and spatial encryption
- An ID-based cryptographic mechanisms based on GDLP and IFP
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
- Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions
- An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
- Efficient statically-secure large-universe multi-authority attribute-based encryption
- Adaptively secure inner product encryption from LWE
- Dynamic decentralized functional encryption
- Boneh-Franklin IBE
- One-round strong oblivious signature-based envelope
- Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey
- (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin
- Minicrypt primitives with algebraic structure and applications
- On the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptography
- Verifiable Inner Product Encryption Scheme
- Lattice-based programmable hash functions and applications
- Bounded Collusion ABE for TMs from IBE
- Registered attribute-based encryption
- Boneh-Boyen IBE
- Functional encryption for cascade automata (extended abstract)
- Security-level switchable attribute-based encryption under the strictly weaker assumption family
- New Anonymity Notions for Identity-Based Encryption
- On the number of solutions of the equation \(Rx^2 + Sy^2\equiv 1\pmod N\)
- scientific article; zbMATH DE number 6866298 (Why is no real title available?)
- ID-based public key cryptographic systems
- Public Key Identification Based on the Equivalence of Quadratic Forms
- Anonymous IBE from Quadratic Residuosity with Fast Encryption
- Identity-based encryption in DDH hard groups
- Cocks’ Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper)
- Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption
- Building Key-Private Public-Key Encryption Schemes
- Signature schemes with randomized verification
- Verifiable registration-based encryption
- Certain sequence of arithmetic progressions and a new key sharing method
- An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model
This page was built for publication: An Identity Based Encryption Scheme Based on Quadratic Residues
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4550285)