Advances in Cryptology - EUROCRYPT 2004
From MaRDI portal
Publication:5307255
DOI10.1007/b97182zbMath1122.94358OpenAlexW2477185671WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307255
Ran Canetti, Shai Halevi, Jonathan N. Katz
Publication date: 25 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b97182
Related Items (only showing first 100 items - show all)
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More ⋮ Efficient subtree-based encryption for fuzzy-entity data sharing ⋮ Upgrading to functional encryption ⋮ An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption ⋮ Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions ⋮ Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system ⋮ Chosen ciphertext secure keyed-homomorphic public-key cryptosystems ⋮ Lattice-based public-key encryption with equality test supporting flexible authorization in standard model ⋮ Efficient revocable identity-based encryption via subset difference methods ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ Public key encryption with equality test in the standard model ⋮ Revocable hierarchical identity-based encryption with shorter private keys and update keys ⋮ CPA-to-CCA transformation for KDM security ⋮ Reconciling non-malleability with homomorphic encryption ⋮ Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles ⋮ Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness ⋮ Improved, black-box, non-malleable encryption from semantic security ⋮ Broadcast encryption based non-interactive key distribution in MANETs ⋮ Identity-based encryption with hierarchical key-insulation in the standard model ⋮ Efficient and fully secure lattice-based IBE with equality test ⋮ Augmented Learning with Errors: The Untapped Potential of the Error Term ⋮ Simulation-based selective opening security for receivers under chosen-ciphertext attacks ⋮ Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts ⋮ Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks ⋮ A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function ⋮ Formal Security Treatments for Signatures from Identity-Based Encryption ⋮ A Brief History of Provably-Secure Public-Key Encryption ⋮ Generic Constructions of Stateful Public Key Encryption and Their Applications ⋮ Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures ⋮ Short signatures without random oracles and the SDH assumption in bilinear groups ⋮ Forward-secure ID based digital signature scheme with forward-secure private key generator ⋮ Attribute-based encryption schemes with constant-size ciphertexts ⋮ Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security ⋮ Shorter quasi-adaptive NIZK proofs for linear subspaces ⋮ Wildcarded identity-based encryption ⋮ Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters ⋮ Secure integration of asymmetric and symmetric encryption schemes ⋮ Simulation-sound arguments for LWE and applications to KDM-CCA2 security ⋮ CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors ⋮ Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups ⋮ Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves ⋮ Signcryption schemes with threshold unsigncryption, and applications ⋮ Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions ⋮ Non-malleable encryption: simpler, shorter, stronger ⋮ Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption ⋮ Lattice-based completely non-malleable public-key encryption in the standard model ⋮ Efficient selective identity-based encryption without random oracles ⋮ Fast, compact, and expressive attribute-based encryption ⋮ Secure public-key encryption scheme without random oracles ⋮ Public key encryption with keyword search secure against keyword guessing attacks without random oracle ⋮ Certificate-based proxy decryption systems with revocability in the standard model ⋮ CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN ⋮ All-in-one group-oriented cryptosystem based on bilinear pairing ⋮ Adaptively Secure Non-interactive Threshold Cryptosystems ⋮ A black-box construction of non-malleable encryption from semantically secure encryption ⋮ Computational friendly attribute-based encryptions with short ciphertext ⋮ IRIBE: intrusion-resilient identity-based encryption ⋮ Verifiability-based conversion from CPA to CCA-secure predicate encryption ⋮ A new framework for the design and analysis of identity-based identification schemes ⋮ Robust encryption ⋮ Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search ⋮ Tag-KEM/DEM: A new framework for hybrid encryption ⋮ Anonymous HIBE with short ciphertexts: full security in prime order groups ⋮ Fully secure functional encryption with a large class of relations from the decisional linear assumption ⋮ A generic construction of CCA-secure deterministic encryption ⋮ Provable secure identity based generalized signcryption scheme ⋮ PRE: stronger security notions and efficient construction with non-interactive opening ⋮ Efficient hybrid encryption from ID-based encryption ⋮ Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption ⋮ Fully CCA2 secure identity based broadcast encryption without random oracles ⋮ Extensions of access structures and their cryptographic applications ⋮ Novel updatable identity-based hash proof system and its applications ⋮ Non-Malleable Encryption: Simpler, Shorter, Stronger ⋮ Secure administration of cryptographic role-based access control for large-scale cloud storage systems ⋮ A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system ⋮ Novel generic construction of leakage-resilient PKE scheme with CCA security ⋮ Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing ⋮ Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman ⋮ Revocable hierarchical identity-based encryption with adaptive security ⋮ One-Time Signatures and Chameleon Hash Functions ⋮ Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption ⋮ Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions ⋮ Fully secure ABE with outsourced decryption against chosen ciphertext attack ⋮ An efficient CCA-secure access control encryption for any policy ⋮ A Lattice-Based Group Signature Scheme with Message-Dependent Opening ⋮ Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost ⋮ Identity Based Group Signatures from Hierarchical Identity-Based Encryption ⋮ Master-key KDM-secure ABE via predicate encoding ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings ⋮ Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes ⋮ Wildcarded identity-based encryption from lattices ⋮ Efficient fully CCA-secure predicate encryptions from pair encodings ⋮ Chosen-ciphertext lattice-based public key encryption with equality test in standard model ⋮ Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN ⋮ Direct chosen-ciphertext secure identity-based key encapsulation without random oracles ⋮ Robust Encryption ⋮ A new cryptosystem based on a twisted Hessian curve \(H^4_{a,d}\) ⋮ Access control encryption from group encryption
This page was built for publication: Advances in Cryptology - EUROCRYPT 2004