Advances in Cryptology - EUROCRYPT 2004
From MaRDI portal
Publication:5307255
Recommendations
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Identity-based encryption tightly secure under chosen-ciphertext attacks
- Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Chosen ciphertext secure identity-based broadcast encryption in the standard model
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
Cited in
(only showing first 100 items - show all)- One-time signatures and chameleon hash functions
- Fully secure ABE with outsourced decryption against chosen ciphertext attack
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Efficient completely non-malleable and RKA secure public key encryptions
- Tagged one-time signatures: tight security and optimal tag size
- Revocable hierarchical identity-based encryption with shorter private keys and update keys
- Shorter quasi-adaptive NIZK proofs for linear subspaces
- A Generic Construction of Integrated Secure-Channel Free PEKS and PKE
- A new McEliece-type cryptosystem using Gabidulin-Kronecker product codes
- Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts
- Unique-path identity based encryption with applications to strongly secure messaging
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- Two-dimensional representation of cover free families and its applications: short signatures and more
- Master-key KDM-secure IBE from pairings
- Secure integration of asymmetric and symmetric encryption schemes
- IBE with tight security against selective opening and chosen-ciphertext attacks
- Master-key KDM-secure ABE via predicate encoding
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings
- Secure administration of cryptographic role-based access control for large-scale cloud storage systems
- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
- Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption
- CPA-to-CCA transformation for KDM security
- Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF
- Forward-Secure Group Encryptions from Lattices
- Secure public-key encryption scheme without random oracles
- Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)
- Public-key anamorphism in (CCA-secure) public-key encryption and beyond
- Identity-based encryption tightly secure under chosen-ciphertext attacks
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
- Efficient and fully secure lattice-based IBE with equality test
- Reconciling non-malleability with homomorphic encryption
- Robust Encryption
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
- Verifiability-based conversion from CPA to CCA-secure predicate encryption
- A more complete analysis of the signal double ratchet algorithm
- All-in-one group-oriented cryptosystem based on bilinear pairing
- Anonymous HIBE with short ciphertexts: full security in prime order groups
- Practical Identity-Based Encryption Without Random Oracles
- Certificate-based proxy decryption systems with revocability in the standard model
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Chosen ciphertext secure fuzzy identity based encryption without ROM
- Chosen-ciphertext lattice-based public key encryption with equality test in standard model
- Multi-identity management for identity-based cryptography
- Lattice-based public-key encryption with equality test supporting flexible authorization in standard model
- Provable secure identity based generalized signcryption scheme
- Attribute-based keyed fully homomorphic encryption
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Computational friendly attribute-based encryptions with short ciphertext
- A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- Tag-KEM/DEM: A new framework for hybrid encryption
- Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost
- Receiver selective opening security for identity-based encryption in the multi-challenge setting
- More efficient adaptively secure lattice-based IBE with equality test in the standard model
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- Forward-secure ID based digital signature scheme with forward-secure private key generator
- Chosen ciphertext secure attribute-based encryption with outsourced decryption
- A new cryptosystem based on a twisted Hessian curve \(H^4_{a,d}\)
- Tightly secure hierarchical identity-based encryption
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
- Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening
- Cryptography with auxiliary input and trapdoor from constant-noise LPN
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
- Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles
- Broadcast encryption based non-interactive key distribution in MANETs
- Efficient chosen-ciphertext security via extractable hash proofs
- CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions
- Wildcarded identity-based encryption from lattices
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- A black-box construction of non-malleable encryption from semantically secure encryption
- On the security of functional encryption in the generic group model
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions
- Non-malleable encryption: simpler, shorter, stronger
- Efficient hybrid encryption from ID-based encryption
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations
- Augmented Learning with Errors: The Untapped Potential of the Error Term
- Identity Based Group Signatures from Hierarchical Identity-Based Encryption
- New technique for chosen-ciphertext security based on non-interactive zero-knowledge
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- A black-box construction of strongly unforgeable signature scheme in the leakage setting
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- A new framework for the design and analysis of identity-based identification schemes
- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks
- Anamorphic signatures: secrecy from a dictator who only permits authentication!
- Efficient selective identity-based encryption without random oracles
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
- Attribute-based encryption schemes with constant-size ciphertexts
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
- Access control encryption from group encryption
- CCA-secure identity-based matchmaking encryption from standard assumptions
This page was built for publication: Advances in Cryptology - EUROCRYPT 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5307255)