An Identity Based Encryption Scheme Based on Quadratic Residues

From MaRDI portal
Publication:4550285

DOI10.1007/3-540-45325-3_32zbMath0999.94532DBLPconf/ima/Cocks01OpenAlexW1797206029WikidataQ56340546 ScholiaQ56340546MaRDI QIDQ4550285

Clifford Cocks

Publication date: 2 December 2002

Published in: Cryptography and Coding (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-45325-3_32




Related Items (only showing first 100 items - show all)

An efficient IBE scheme with tight security reduction in the random oracle modelComment on ``A strong provably secure IBE scheme without bilinear map by M. Zheng, Y. Xiang and H. ZhouMulti-authority attribute-based encryption with honest-but-curious central authorityGeneric Constructions of Revocable Identity-Based EncryptionVerifiable Inner Product Encryption SchemeEfficient subtree-based encryption for fuzzy-entity data sharingRegistration-based encryption: removing private-key generator from IBEBoneh-Franklin IBEBoneh-Boyen IBEHIBE: Hierarchical Identity-Based EncryptionExtended dual system group and shorter unbounded hierarchical identity based encryptionFine-grained secure attribute-based encryptionPredicate encryption supporting disjunctions, polynomial equations, and inner productsNew Proof for BKP IBE Scheme and Improvement in the MIMC SettingBilinear Entropy Expansion from the Decisional Linear AssumptionSemi-adaptive Security and Bundling Functionalities Made Generic and EasySingle-Key to Multi-Key Functional Encryption with Polynomial LossFine-grained forward secrecy: allow-list/deny-list encryption and applicationsIdentity-based signature scheme based on quadratic residuesAnonymous IBE, leakage resilience and circular security from new assumptionsA New General Framework for Secure Public Key Encryption with Keyword SearchDynamic collusion bounded functional encryption from identity-based encryptionOn the power of rewinding simulators in functional encryptionTightly CCA-secure identity-based encryption with ciphertext pseudorandomnessBonsai trees, or how to delegate a lattice basisForward-secure revocable identity-based encryptionEfficient Statically-Secure Large-Universe Multi-Authority Attribute-Based EncryptionAn identity-based encryption scheme with compact ciphertextsAn identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystemPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsSpatial encryption supporting non-monotone access structureShorter identity-based encryption via asymmetric pairingsForward-secure identity-based signature: security notions and constructionFormal Security Treatments for Signatures from Identity-Based EncryptionFunctional encryption for computational hiding in prime order groups via pair encodingsAn Efficient and Provable Secure Identity-Based Identification Scheme in the Standard ModelForward-secure ID based digital signature scheme with forward-secure private key generatorCertificateless public key encryption with equality testWildcarded identity-based encryptionRelations between semantic security and anonymity in identity-based encryptionInner-product encryption under standard assumptionsOn the number of solutions of the equation \(Rx^2 + Sy^2\equiv 1\pmod N\)Adaptively secure inner product encryption from LWECertain sequence of arithmetic progressions and a new key sharing methodOn the impossibility of purely algebraic signaturesHeuristics of the Cocks-Pinch methodSecurity-level switchable attribute-based encryption under the strictly weaker assumption familyAn ID-based cryptographic mechanisms based on GDLP and IFPThe relation and transformation between hierarchical inner product encryption and spatial encryptionAn Identity-Based Key Agreement Protocol for the Network LayerEfficient selective identity-based encryption without random oraclesIdentity-Based Broadcast Encryption with Constant Size Ciphertexts and Private KeysBlind Identity-Based Encryption and Simulatable Oblivious TransferAn efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problemExtended Galbraith's test on the anonymity of IBE schemes from higher residuosityIdentity-based ring signatures from RSAFunctional encryption for randomized functionalities in the private-key setting from minimal assumptionsFunction-private functional encryption in the private-key settingForward-secure identity-based encryption with direct chosen-ciphertext security in the standard modelIRIBE: intrusion-resilient identity-based encryptionVerifiability-based conversion from CPA to CCA-secure predicate encryptionMulti-input functional encryption in the private-key setting: stronger security from weaker assumptionsFunctional Encryption: Origins and Recent DevelopmentsAttribute-Based Encryption with Fast DecryptionFully secure functional encryption with a large class of relations from the decisional linear assumptionFunctional encryption for cascade automataSecurity and Anonymity of Identity-Based Encryption with Multiple Trusted AuthoritiesFully CCA2 secure identity based broadcast encryption without random oraclesProtecting against key-exposure: strongly key-insulated encryption with optimal thresholdSecure administration of cryptographic role-based access control for large-scale cloud storage systemsOn the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptographyOn the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groupsFunctional Encryption for Cascade Automata (Extended Abstract)Lattice-based identity-based resplittable threshold public key encryption schemeAdaptive-ID Secure Revocable Identity-Based EncryptionUniversally Anonymous IBE Based on the Quadratic Residuosity AssumptionA strong provably secure IBE scheme without bilinear mapSimulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE SchemeVerifiable Random Functions from Identity-Based Key EncapsulationCandidate Indistinguishability Obfuscation and Functional Encryption for All CircuitsOne-Round Strong Oblivious Signature-Based EnvelopeBuilding Key-Private Public-Key Encryption SchemesChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionDesigning a secure e-tender submission protocolGeneralized Learning Problems and Applications to Non-commutative CryptographyIdentity Based Group Signatures from Hierarchical Identity-Based EncryptionRevocable identity-based encryption with server-aided ciphertext evolutionBeta Weil pairing revisitedProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesEfficient fully CCA-secure predicate encryptions from pair encodingsA new approach to practical function-private inner product encryptionAn efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystemDirect chosen-ciphertext secure identity-based key encapsulation without random oraclesNew Techniques for Dual System Encryption and Fully Secure HIBE with Short CiphertextsA new identity-based multivariate signature schemeIdentity oriented signature scheme based on quadratic residuesVerifiable registration-based encryptionDynamic decentralized functional encryptionUnnamed ItemAdequate Elliptic Curves for Computing the Product of n Pairings






This page was built for publication: An Identity Based Encryption Scheme Based on Quadratic Residues