An Identity Based Encryption Scheme Based on Quadratic Residues
From MaRDI portal
Publication:4550285
Recommendations
Cited in
(only showing first 100 items - show all)- Anonymous IBE from Quadratic Residuosity with Fast Encryption
- Cocks’ Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper)
- Multi-client functional encryption with fine-grained access control
- Relations between semantic security and anonymity in identity-based encryption
- Boneh-Boyen IBE
- (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin
- Bonsai trees, or how to delegate a lattice basis
- Sherlock Holmes zero-knowledge protocols
- Functional encryption for computational hiding in prime order groups via pair encodings
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Verifiability-based conversion from CPA to CCA-secure predicate encryption
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- ID-based public key cryptographic systems
- Fine-grained secure attribute-based encryption
- Adaptive-ID Secure Revocable Identity-Based Encryption
- New Proof for BKP IBE Scheme and Improvement in the MIMC Setting
- Fine-grained secure attribute-based encryption
- Revocable identity-based encryption with server-aided ciphertext evolution
- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
- scientific article; zbMATH DE number 2222192 (Why is no real title available?)
- Efficient subtree-based encryption for fuzzy-entity data sharing
- A new identity-based multivariate signature scheme
- Optimal security notion for decentralized multi-client functional encryption
- Dynamic collusion bounded functional encryption from identity-based encryption
- Identity-based ring signatures from RSA
- On the impossibility of purely algebraic signatures
- Efficient statically-secure large-universe multi-authority attribute-based encryption
- Forward-secure ID based digital signature scheme with forward-secure private key generator
- Public-key encryption algorithm incorporating error detection
- Adaptively secure identity-based encryption from middle-product learning with errors
- Identity-based encryption from lattices using approximate trapdoors
- A new general framework for secure public key encryption with keyword search
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
- Tightly secure hierarchical identity-based encryption
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
- New Anonymity Notions for Identity-Based Encryption
- Towards practical topology-hiding computation
- Certain sequence of arithmetic progressions and a new key sharing method
- Public Key Identification Based on the Equivalence of Quadratic Forms
- Improvements on non-interactive zero-knowledge proof systems related to quadratic residuosity languages
- Dynamic decentralized functional encryption
- On the number of solutions of the equation \(Rx^2 + Sy^2\equiv 1\pmod N\)
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Security-level switchable attribute-based encryption under the strictly weaker assumption family
- Multi-authority attribute-based encryption with honest-but-curious central authority
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- An efficient IBE scheme with tight security reduction in the random oracle model
- Identity Based Group Signatures from Hierarchical Identity-Based Encryption
- An ID-based cryptographic mechanisms based on GDLP and IFP
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
- Signature schemes with randomized verification
- Identity-based matchmaking encryption from standard assumptions
- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption
- Spatial encryption supporting non-monotone access structure
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Tightly secure (H)IBE in the random oracle model
- Comment on ``A strong provably secure IBE scheme without bilinear map by M. Zheng, Y. Xiang and H. Zhou
- Verifiable Random Functions from Identity-Based Key Encapsulation
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- An identity-based encryption scheme with compact ciphertexts
- Efficient selective identity-based encryption without random oracles
- Attribute-based encryption with fast decryption
- Identity-based signature scheme based on quadratic residues
- An applications of signed quadratic residues in public key cryptography
- CCA-secure identity-based matchmaking encryption from standard assumptions
- Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity
- Forward-secure revocable identity-based encryption
- IRIBE: intrusion-resilient identity-based encryption
- Formal Security Treatments for Signatures from Identity-Based Encryption
- Certificateless public key encryption with equality test
- An Identity-Based Key Agreement Protocol for the Network Layer
- An identity based threshold scheme
- Adequate elliptic curves for computing the product of \(n\) pairings
- Function-private functional encryption in the private-key setting
- scientific article; zbMATH DE number 6866298 (Why is no real title available?)
- Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey
- Fully secure functional encryption with a large class of relations from the decisional linear assumption
- Functional encryption for cascade automata
- A strong provably secure IBE scheme without bilinear map
- Functional encryption: origins and recent developments
- On Constructing Pairing-Free Identity-Based Encryptions
- Registration-based encryption: removing private-key generator from IBE
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding
- Minicrypt primitives with algebraic structure and applications
- Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions
- Bounded Collusion ABE for TMs from IBE
- Predicate encryption supporting disjunctions, polynomial equations, and inner products
- On the power of rewinding simulators in functional encryption
- Oblivious signature-based envelope
- Inner-product encryption under standard assumptions
- Verifiable Inner Product Encryption Scheme
- Identity-Based Cryptosystems and Quadratic Residuosity
- On the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptography
- One-round strong oblivious signature-based envelope
- Single-key to multi-key functional encryption with polynomial loss
- Boneh-Franklin IBE
- Efficient fully CCA-secure predicate encryptions from pair encodings
This page was built for publication: An Identity Based Encryption Scheme Based on Quadratic Residues
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4550285)