scientific article; zbMATH DE number 2086699

From MaRDI portal
Publication:4737236

zbMath1055.94012MaRDI QIDQ4737236

Shouhuai Xu, Yevgeniy Dodis, Jonathan N. Katz, Mordechai M. Yung

Publication date: 11 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320065.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Self-updatable encryption with short public parameters and its extensions, Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More, Public-Key Puncturable Encryption: Modular and Compact Constructions, Key-insulated aggregate signature, CCA secure \textit{a posteriori} openable encryption in the standard model, Anonymous IBE, leakage resilience and circular security from new assumptions, Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves, Constructions of CCA-Secure Revocable Identity-Based Encryption, Dynamic collusion bounded functional encryption from identity-based encryption, Optimal bounded-collusion secure functional encryption, \texttt{FlipIt}: the game of ``stealthy takeover, Identity-based encryption with hierarchical key-insulation in the standard model, Strong key-insulated signature in the standard model, Unique-path identity based encryption with applications to strongly secure messaging, Certificateless key-insulated signature without random oracles, Certificateless strong key-insulated signature without random oracles, An Efficient Strong Key-Insulated Signature Scheme and Its Application, Forward-secure encryption with fast forwarding, Adaptive multiparty NIKE, An efficient threshold key-insulated signature scheme, Generic Construction of Bounded-Collusion IBE via Table-Based ID-to-Key Map, Efficient identity-based encryption with hierarchical key-insulation from HIBE, Functional encryption for cubic polynomials and implementation, One forward-secure signature scheme using bilinear maps and its applications, Self-updatable encryption: time constrained access control with hidden attributes and better efficiency, Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model, IRIBE: intrusion-resilient identity-based encryption, Revocable Identity-Based Encryption Revisited: Security Model and Construction, Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions, Revocable hierarchical identity-based encryption, Protecting against key-exposure: strongly key-insulated encryption with optimal threshold, Bandwidth-efficient attribute-based key-insulated signatures with message recovery, Attribute-based key-insulated signature and its applications, Scalable public-key tracing and revoking, An improved certificateless strong key-insulated signature scheme in the standard model, Identity-Based Threshold Key-Insulated Encryption without Random Oracles, Key Insulation and Intrusion Resilience over a Public Channel, Verifiable random functions: relations to identity-based key encapsulation and new constructions, Leakage Resilient Strong Key-Insulated Signatures in Public Channel, Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk), Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps, Secure Key-Updating for Lazy Revocation