An Identity Based Encryption Scheme Based on Quadratic Residues
From MaRDI portal
Publication:4550285
DOI10.1007/3-540-45325-3_32zbMath0999.94532DBLPconf/ima/Cocks01OpenAlexW1797206029WikidataQ56340546 ScholiaQ56340546MaRDI QIDQ4550285
Publication date: 2 December 2002
Published in: Cryptography and Coding (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-45325-3_32
Related Items (only showing first 100 items - show all)
An efficient IBE scheme with tight security reduction in the random oracle model ⋮ Comment on ``A strong provably secure IBE scheme without bilinear map by M. Zheng, Y. Xiang and H. Zhou ⋮ Multi-authority attribute-based encryption with honest-but-curious central authority ⋮ Generic Constructions of Revocable Identity-Based Encryption ⋮ Verifiable Inner Product Encryption Scheme ⋮ Efficient subtree-based encryption for fuzzy-entity data sharing ⋮ Registration-based encryption: removing private-key generator from IBE ⋮ Boneh-Franklin IBE ⋮ Boneh-Boyen IBE ⋮ HIBE: Hierarchical Identity-Based Encryption ⋮ Extended dual system group and shorter unbounded hierarchical identity based encryption ⋮ Fine-grained secure attribute-based encryption ⋮ Predicate encryption supporting disjunctions, polynomial equations, and inner products ⋮ New Proof for BKP IBE Scheme and Improvement in the MIMC Setting ⋮ Bilinear Entropy Expansion from the Decisional Linear Assumption ⋮ Semi-adaptive Security and Bundling Functionalities Made Generic and Easy ⋮ Single-Key to Multi-Key Functional Encryption with Polynomial Loss ⋮ Fine-grained forward secrecy: allow-list/deny-list encryption and applications ⋮ Identity-based signature scheme based on quadratic residues ⋮ Anonymous IBE, leakage resilience and circular security from new assumptions ⋮ A New General Framework for Secure Public Key Encryption with Keyword Search ⋮ Dynamic collusion bounded functional encryption from identity-based encryption ⋮ On the power of rewinding simulators in functional encryption ⋮ Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness ⋮ Bonsai trees, or how to delegate a lattice basis ⋮ Forward-secure revocable identity-based encryption ⋮ Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption ⋮ An identity-based encryption scheme with compact ciphertexts ⋮ An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem ⋮ Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps ⋮ Spatial encryption supporting non-monotone access structure ⋮ Shorter identity-based encryption via asymmetric pairings ⋮ Forward-secure identity-based signature: security notions and construction ⋮ Formal Security Treatments for Signatures from Identity-Based Encryption ⋮ Functional encryption for computational hiding in prime order groups via pair encodings ⋮ An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model ⋮ Forward-secure ID based digital signature scheme with forward-secure private key generator ⋮ Certificateless public key encryption with equality test ⋮ Wildcarded identity-based encryption ⋮ Relations between semantic security and anonymity in identity-based encryption ⋮ Inner-product encryption under standard assumptions ⋮ On the number of solutions of the equation \(Rx^2 + Sy^2\equiv 1\pmod N\) ⋮ Adaptively secure inner product encryption from LWE ⋮ Certain sequence of arithmetic progressions and a new key sharing method ⋮ On the impossibility of purely algebraic signatures ⋮ Heuristics of the Cocks-Pinch method ⋮ Security-level switchable attribute-based encryption under the strictly weaker assumption family ⋮ An ID-based cryptographic mechanisms based on GDLP and IFP ⋮ The relation and transformation between hierarchical inner product encryption and spatial encryption ⋮ An Identity-Based Key Agreement Protocol for the Network Layer ⋮ Efficient selective identity-based encryption without random oracles ⋮ Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys ⋮ Blind Identity-Based Encryption and Simulatable Oblivious Transfer ⋮ An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem ⋮ Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity ⋮ Identity-based ring signatures from RSA ⋮ Functional encryption for randomized functionalities in the private-key setting from minimal assumptions ⋮ Function-private functional encryption in the private-key setting ⋮ Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model ⋮ IRIBE: intrusion-resilient identity-based encryption ⋮ Verifiability-based conversion from CPA to CCA-secure predicate encryption ⋮ Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions ⋮ Functional Encryption: Origins and Recent Developments ⋮ Attribute-Based Encryption with Fast Decryption ⋮ Fully secure functional encryption with a large class of relations from the decisional linear assumption ⋮ Functional encryption for cascade automata ⋮ Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities ⋮ Fully CCA2 secure identity based broadcast encryption without random oracles ⋮ Protecting against key-exposure: strongly key-insulated encryption with optimal threshold ⋮ Secure administration of cryptographic role-based access control for large-scale cloud storage systems ⋮ On the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptography ⋮ On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups ⋮ Functional Encryption for Cascade Automata (Extended Abstract) ⋮ Lattice-based identity-based resplittable threshold public key encryption scheme ⋮ Adaptive-ID Secure Revocable Identity-Based Encryption ⋮ Universally Anonymous IBE Based on the Quadratic Residuosity Assumption ⋮ A strong provably secure IBE scheme without bilinear map ⋮ Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme ⋮ Verifiable Random Functions from Identity-Based Key Encapsulation ⋮ Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits ⋮ One-Round Strong Oblivious Signature-Based Envelope ⋮ Building Key-Private Public-Key Encryption Schemes ⋮ Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption ⋮ Designing a secure e-tender submission protocol ⋮ Generalized Learning Problems and Applications to Non-commutative Cryptography ⋮ Identity Based Group Signatures from Hierarchical Identity-Based Encryption ⋮ Revocable identity-based encryption with server-aided ciphertext evolution ⋮ Beta Weil pairing revisited ⋮ Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes ⋮ Efficient fully CCA-secure predicate encryptions from pair encodings ⋮ A new approach to practical function-private inner product encryption ⋮ An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem ⋮ Direct chosen-ciphertext secure identity-based key encapsulation without random oracles ⋮ New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts ⋮ A new identity-based multivariate signature scheme ⋮ Identity oriented signature scheme based on quadratic residues ⋮ Verifiable registration-based encryption ⋮ Dynamic decentralized functional encryption ⋮ Unnamed Item ⋮ Adequate Elliptic Curves for Computing the Product of n Pairings
This page was built for publication: An Identity Based Encryption Scheme Based on Quadratic Residues