Advances in Cryptology - EUROCRYPT 2004
From MaRDI portal
Publication:5307255
DOI10.1007/B97182zbMATH Open1122.94358OpenAlexW2477185671MaRDI QIDQ5307255FDOQ5307255
Authors: Ran Canetti, Shai Halevi, Jonathan Katz
Publication date: 25 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b97182
Recommendations
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Identity-based encryption tightly secure under chosen-ciphertext attacks
- Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Chosen ciphertext secure identity-based broadcast encryption in the standard model
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
Cited In (only showing first 100 items - show all)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions
- Non-malleable encryption: simpler, shorter, stronger
- New technique for chosen-ciphertext security based on non-interactive zero-knowledge
- A black-box construction of strongly unforgeable signature scheme in the leakage setting
- Access control encryption from group encryption
- An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption
- Fully secure functional encryption with a large class of relations from the decisional linear assumption
- A generic construction of CCA-secure deterministic encryption
- Signcryption schemes with threshold unsigncryption, and applications
- Identity-based encryption with hierarchical key-insulation in the standard model
- PRE: stronger security notions and efficient construction with non-interactive opening
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
- Robust encryption
- Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman
- Public key encryption with equality test in the standard model
- Efficient fully CCA-secure predicate encryptions from pair encodings
- Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts
- Improved, black-box, non-malleable encryption from semantic security
- Lattice-based completely non-malleable public-key encryption in the standard model
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
- Novel generic construction of leakage-resilient PKE scheme with CCA security
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
- Chosen ciphertext secure identity-based broadcast encryption in the standard model
- A lattice-based group signature scheme with message-dependent opening
- Strongly anonymous ratcheted key exchange
- Identity-Based Online/Offline Encryption
- Chosen ciphertext secure keyed-homomorphic public-key encryption
- Simulation-sound arguments for LWE and applications to KDM-CCA2 security
- Novel updatable identity-based hash proof system and its applications
- Simpler CCA-secure public key encryption from lossy trapdoor functions
- Wildcarded identity-based encryption
- Generic constructions of integrated PKE and PEKS
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- A Generic Construction of Integrated Secure-Channel Free PEKS and PKE
- Fully secure ABE with outsourced decryption against chosen ciphertext attack
- Revocable hierarchical identity-based encryption with shorter private keys and update keys
- Master-key KDM-secure IBE from pairings
- Two-dimensional representation of cover free families and its applications: short signatures and more
- Master-key KDM-secure ABE via predicate encoding
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings
- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
- Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption
- CPA-to-CCA transformation for KDM security
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
- Efficient and fully secure lattice-based IBE with equality test
- Anonymous HIBE with short ciphertexts: full security in prime order groups
- Multi-identity management for identity-based cryptography
- Chosen-ciphertext lattice-based public key encryption with equality test in standard model
- Lattice-based public-key encryption with equality test supporting flexible authorization in standard model
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- Tag-KEM/DEM: A new framework for hybrid encryption
- Tightly secure hierarchical identity-based encryption
- Chosen ciphertext secure attribute-based encryption with outsourced decryption
- A new cryptosystem based on a twisted Hessian curve \(H^4_{a,d}\)
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
- Cryptography with auxiliary input and trapdoor from constant-noise LPN
- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions
- Efficient chosen-ciphertext security via extractable hash proofs
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
- CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN
- A black-box construction of non-malleable encryption from semantically secure encryption
- Efficient hybrid encryption from ID-based encryption
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- Identity Based Group Signatures from Hierarchical Identity-Based Encryption
- Augmented Learning with Errors: The Untapped Potential of the Error Term
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- A new framework for the design and analysis of identity-based identification schemes
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Efficient selective identity-based encryption without random oracles
- Attribute-based encryption schemes with constant-size ciphertexts
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
- Formal Security Treatments for Signatures from Identity-Based Encryption
- IRIBE: intrusion-resilient identity-based encryption
- Theory of Cryptography
- Theory of Cryptography
- On Constructing Pairing-Free Identity-Based Encryptions
- Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption
- Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption
- Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
- Upgrading to functional encryption
- Extensions of access structures and their cryptographic applications
- Non-malleable encryption: simpler, shorter, stronger
- Fast, compact, and expressive attribute-based encryption
- A new paradigm for public-key functional encryption for degree-2 polynomials
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- An efficient CCA-secure access control encryption for any policy
- Revocable hierarchical identity-based encryption with adaptive security
- Robust encryption, revisited
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- Topics in Cryptology – CT-RSA 2005
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Simulation-based selective opening security for receivers under chosen-ciphertext attacks
This page was built for publication: Advances in Cryptology - EUROCRYPT 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5307255)