Advances in Cryptology - EUROCRYPT 2004

From MaRDI portal
Publication:5307255

DOI10.1007/b97182zbMath1122.94358OpenAlexW2477185671WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307255

Ran Canetti, Shai Halevi, Jonathan N. Katz

Publication date: 25 September 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b97182




Related Items (only showing first 100 items - show all)

Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and MoreEfficient subtree-based encryption for fuzzy-entity data sharingUpgrading to functional encryptionAn efficient CCA-secure cryptosystem over ideal lattices from identity-based encryptionSimpler CCA-Secure Public Key Encryption from Lossy Trapdoor FunctionsSuper-strong RKA secure MAC, PKE and SE from tag-based hash proof systemChosen ciphertext secure keyed-homomorphic public-key cryptosystemsLattice-based public-key encryption with equality test supporting flexible authorization in standard modelEfficient revocable identity-based encryption via subset difference methodsPublic-key encryption for protecting data in cloud system with intelligent agents against side-channel attacksPublic key encryption with equality test in the standard modelRevocable hierarchical identity-based encryption with shorter private keys and update keysCPA-to-CCA transformation for KDM securityReconciling non-malleability with homomorphic encryptionProxy-invisible CCA-secure type-based proxy re-encryption without random oraclesTightly CCA-secure identity-based encryption with ciphertext pseudorandomnessImproved, black-box, non-malleable encryption from semantic securityBroadcast encryption based non-interactive key distribution in MANETsIdentity-based encryption with hierarchical key-insulation in the standard modelEfficient and fully secure lattice-based IBE with equality testAugmented Learning with Errors: The Untapped Potential of the Error TermSimulation-based selective opening security for receivers under chosen-ciphertext attacksZero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group EncryptionSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceCCA2-Secure Threshold Broadcast Encryption with Shorter CiphertextsConstruction of a Hybrid HIBE Protocol Secure Against Adaptive AttacksA CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash FunctionFormal Security Treatments for Signatures from Identity-Based EncryptionA Brief History of Provably-Secure Public-Key EncryptionGeneric Constructions of Stateful Public Key Encryption and Their ApplicationsAttribute-Based Encryption with Partially Hidden Encryptor-Specified Access StructuresShort signatures without random oracles and the SDH assumption in bilinear groupsForward-secure ID based digital signature scheme with forward-secure private key generatorAttribute-based encryption schemes with constant-size ciphertextsEfficient bidirectional proxy re-encryption with direct chosen-ciphertext securityShorter quasi-adaptive NIZK proofs for linear subspacesWildcarded identity-based encryptionIdentity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parametersSecure integration of asymmetric and symmetric encryption schemesSimulation-sound arguments for LWE and applications to KDM-CCA2 securityCCA-secure (puncturable) KEMs from encryption with non-negligible decryption errorsAdaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroupsEncoding-Free ElGamal-Type Encryption Schemes on Elliptic CurvesSigncryption schemes with threshold unsigncryption, and applicationsAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsNon-malleable encryption: simpler, shorter, strongerZero-knowledge arguments for matrix-vector relations and lattice-based group encryptionLattice-based completely non-malleable public-key encryption in the standard modelEfficient selective identity-based encryption without random oraclesFast, compact, and expressive attribute-based encryptionSecure public-key encryption scheme without random oraclesPublic key encryption with keyword search secure against keyword guessing attacks without random oracleCertificate-based proxy decryption systems with revocability in the standard modelCPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPNAll-in-one group-oriented cryptosystem based on bilinear pairingAdaptively Secure Non-interactive Threshold CryptosystemsA black-box construction of non-malleable encryption from semantically secure encryptionComputational friendly attribute-based encryptions with short ciphertextIRIBE: intrusion-resilient identity-based encryptionVerifiability-based conversion from CPA to CCA-secure predicate encryptionA new framework for the design and analysis of identity-based identification schemesRobust encryptionChosen-ciphertext secure anonymous conditional proxy re-encryption with keyword searchTag-KEM/DEM: A new framework for hybrid encryptionAnonymous HIBE with short ciphertexts: full security in prime order groupsFully secure functional encryption with a large class of relations from the decisional linear assumptionA generic construction of CCA-secure deterministic encryptionProvable secure identity based generalized signcryption schemePRE: stronger security notions and efficient construction with non-interactive openingEfficient hybrid encryption from ID-based encryptionMulti-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryptionFully CCA2 secure identity based broadcast encryption without random oraclesExtensions of access structures and their cryptographic applicationsNovel updatable identity-based hash proof system and its applicationsNon-Malleable Encryption: Simpler, Shorter, StrongerSecure administration of cryptographic role-based access control for large-scale cloud storage systemsA CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing systemNovel generic construction of leakage-resilient PKE scheme with CCA securityEnsuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computingRelated-key secure key encapsulation from extended computational bilinear Diffie-HellmanRevocable hierarchical identity-based encryption with adaptive securityOne-Time Signatures and Chameleon Hash FunctionsChosen Ciphertext Secure Attribute-Based Encryption with Outsourced DecryptionEfficient Completely Non-Malleable and RKA Secure Public Key EncryptionsFully secure ABE with outsourced decryption against chosen ciphertext attackAn efficient CCA-secure access control encryption for any policyA Lattice-Based Group Signature Scheme with Message-Dependent OpeningEfficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-CostIdentity Based Group Signatures from Hierarchical Identity-Based EncryptionMaster-key KDM-secure ABE via predicate encodingNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesWildcarded identity-based encryption from latticesEfficient fully CCA-secure predicate encryptions from pair encodingsChosen-ciphertext lattice-based public key encryption with equality test in standard modelCryptography with Auxiliary Input and Trapdoor from Constant-Noise LPNDirect chosen-ciphertext secure identity-based key encapsulation without random oraclesRobust EncryptionA new cryptosystem based on a twisted Hessian curve \(H^4_{a,d}\)Access control encryption from group encryption




This page was built for publication: Advances in Cryptology - EUROCRYPT 2004