An Identity Based Encryption Scheme Based on Quadratic Residues
From MaRDI portal
Publication:4550285
DOI10.1007/3-540-45325-3_32zbMATH Open0999.94532DBLPconf/ima/Cocks01OpenAlexW1797206029WikidataQ56340546 ScholiaQ56340546MaRDI QIDQ4550285FDOQ4550285
Authors: Clifford Cocks
Publication date: 2 December 2002
Published in: Cryptography and Coding (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-45325-3_32
Recommendations
Cited In (only showing first 100 items - show all)
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
- Identity Based Group Signatures from Hierarchical Identity-Based Encryption
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- An efficient IBE scheme with tight security reduction in the random oracle model
- An ID-based cryptographic mechanisms based on GDLP and IFP
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Spatial encryption supporting non-monotone access structure
- Verifiable Random Functions from Identity-Based Key Encapsulation
- Comment on ``A strong provably secure IBE scheme without bilinear map by M. Zheng, Y. Xiang and H. Zhou
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Attribute-based encryption with fast decryption
- An identity-based encryption scheme with compact ciphertexts
- Identity-based signature scheme based on quadratic residues
- Efficient selective identity-based encryption without random oracles
- Formal Security Treatments for Signatures from Identity-Based Encryption
- An Identity-Based Key Agreement Protocol for the Network Layer
- Certificateless public key encryption with equality test
- IRIBE: intrusion-resilient identity-based encryption
- Function-private functional encryption in the private-key setting
- On Constructing Pairing-Free Identity-Based Encryptions
- Functional encryption: origins and recent developments
- A strong provably secure IBE scheme without bilinear map
- Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding
- Registration-based encryption: removing private-key generator from IBE
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Oblivious signature-based envelope
- Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions
- Predicate encryption supporting disjunctions, polynomial equations, and inner products
- On the power of rewinding simulators in functional encryption
- Inner-product encryption under standard assumptions
- Single-key to multi-key functional encryption with polynomial loss
- A new approach to practical function-private inner product encryption
- Identity oriented signature scheme based on quadratic residues
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Forward-secure identity-based signature: security notions and construction
- Bilinear entropy expansion from the decisional linear assumption
- Semi-adaptive security and bundling functionalities made generic and easy
- Fully CCA2 secure identity based broadcast encryption without random oracles
- Designing a secure e-tender submission protocol
- Shorter identity-based encryption via asymmetric pairings
- The relation and transformation between hierarchical inner product encryption and spatial encryption
- Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
- An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- Relations between semantic security and anonymity in identity-based encryption
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Bonsai trees, or how to delegate a lattice basis
- Functional encryption for computational hiding in prime order groups via pair encodings
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- Verifiability-based conversion from CPA to CCA-secure predicate encryption
- Fine-grained secure attribute-based encryption
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Fine-grained secure attribute-based encryption
- Revocable identity-based encryption with server-aided ciphertext evolution
- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
- Title not available (Why is that?)
- Optimal security notion for decentralized multi-client functional encryption
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Dynamic collusion bounded functional encryption from identity-based encryption
- Identity-based ring signatures from RSA
- Efficient statically-secure large-universe multi-authority attribute-based encryption
- A new general framework for secure public key encryption with keyword search
- Forward-secure ID based digital signature scheme with forward-secure private key generator
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Security-level switchable attribute-based encryption under the strictly weaker assumption family
- Multi-authority attribute-based encryption with honest-but-curious central authority
- Signature schemes with randomized verification
- Identity-based matchmaking encryption from standard assumptions
- Tightly secure (H)IBE in the random oracle model
- CCA-secure identity-based matchmaking encryption from standard assumptions
- An applications of signed quadratic residues in public key cryptography
- Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity
- Forward-secure revocable identity-based encryption
- An identity based threshold scheme
- Adequate elliptic curves for computing the product of \(n\) pairings
- Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey
- Title not available (Why is that?)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption
- Functional encryption for cascade automata
- Minicrypt primitives with algebraic structure and applications
- Bounded Collusion ABE for TMs from IBE
- Verifiable Inner Product Encryption Scheme
- Identity-Based Cryptosystems and Quadratic Residuosity
- Boneh-Franklin IBE
- One-round strong oblivious signature-based envelope
- On the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptography
- Efficient fully CCA-secure predicate encryptions from pair encodings
- A survey on functional encryption
- New Anonymity Notions for Identity-Based Encryption
- Generalized learning problems and applications to non-commutative cryptography. (Extended abstract)
- Building Key-Private Public-Key Encryption Schemes
- Generic constructions of revocable identity-based encryption
- Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption
This page was built for publication: An Identity Based Encryption Scheme Based on Quadratic Residues
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4550285)