Advances in Cryptology - EUROCRYPT 2004
From MaRDI portal
Publication:5307255
Recommendations
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Identity-based encryption tightly secure under chosen-ciphertext attacks
- Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Chosen ciphertext secure identity-based broadcast encryption in the standard model
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
Cited in
(only showing first 100 items - show all)- A black-box construction of non-malleable encryption from semantically secure encryption
- On the security of functional encryption in the generic group model
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions
- Non-malleable encryption: simpler, shorter, stronger
- Efficient hybrid encryption from ID-based encryption
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations
- Augmented Learning with Errors: The Untapped Potential of the Error Term
- Identity Based Group Signatures from Hierarchical Identity-Based Encryption
- New technique for chosen-ciphertext security based on non-interactive zero-knowledge
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- A black-box construction of strongly unforgeable signature scheme in the leakage setting
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- A new framework for the design and analysis of identity-based identification schemes
- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks
- Anamorphic signatures: secrecy from a dictator who only permits authentication!
- Efficient selective identity-based encryption without random oracles
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
- Attribute-based encryption schemes with constant-size ciphertexts
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
- Access control encryption from group encryption
- CCA-secure identity-based matchmaking encryption from standard assumptions
- Identity-based proxy re-encryption based on SM9
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Survey of lattice-based group signature
- IRIBE: intrusion-resilient identity-based encryption
- Formal Security Treatments for Signatures from Identity-Based Encryption
- Theory of Cryptography
- Theory of Cryptography
- On the Impossibility of Strong Encryption Over $\aleph_0$
- An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption
- Fully secure functional encryption with a large class of relations from the decisional linear assumption
- A generic construction of CCA-secure deterministic encryption
- Generic Constructions of Stateful Public Key Encryption and Their Applications
- Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption
- On Constructing Pairing-Free Identity-Based Encryptions
- Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption
- Upgrading to functional encryption
- Signcryption schemes with threshold unsigncryption, and applications
- A timed-release proxy re-encryption scheme and its application to fairly-opened multicast communication
- Extensions of access structures and their cryptographic applications
- Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
- Identity-based encryption with hierarchical key-insulation in the standard model
- PRE: stronger security notions and efficient construction with non-interactive opening
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
- Robust encryption
- Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman
- Public key encryption with equality test in the standard model
- Fast, compact, and expressive attribute-based encryption
- Non-malleable encryption: simpler, shorter, stronger
- A new paradigm for public-key functional encryption for degree-2 polynomials
- An efficient CCA-secure access control encryption for any policy
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Efficient fully CCA-secure predicate encryptions from pair encodings
- Encoding-free ElGamal-type encryption schemes on elliptic curves
- Revocable hierarchical identity-based encryption with adaptive security
- A generic construction of CCA-secure attribute-based encryption with equality test
- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function
- Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts
- Improved, black-box, non-malleable encryption from semantic security
- Lattice-based completely non-malleable public-key encryption in the standard model
- Robust encryption, revisited
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- A Brief History of Provably-Secure Public-Key Encryption
- Chosen ciphertext secure authenticated group communication using identity-based signcryption
- Topics in Cryptology – CT-RSA 2005
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
- Simulation-based selective opening security for receivers under chosen-ciphertext attacks
- Building Key-Private Public-Key Encryption Schemes
- Novel generic construction of leakage-resilient PKE scheme with CCA security
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
- Chosen ciphertext secure identity-based broadcast encryption in the standard model
- Lattice-based programmable hash functions and applications
- Fully CCA2 secure identity based broadcast encryption without random oracles
- Multimodal private signatures
- The Boneh-Katz transformation, revisited: pseudorandom/obliviously-samplable PKE from lattices and codes and its application
- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
- A lattice-based group signature scheme with message-dependent opening
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- Identity-Based Online/Offline Encryption
- Simulation-sound arguments for LWE and applications to KDM-CCA2 security
- Strongly anonymous ratcheted key exchange
- Chosen ciphertext secure keyed-homomorphic public-key encryption
- Novel updatable identity-based hash proof system and its applications
- Simpler CCA-secure public key encryption from lossy trapdoor functions
- Efficient revocable identity-based encryption via subset difference methods
- Short signatures without random oracles and the SDH assumption in bilinear groups
- Adaptively secure non-interactive threshold cryptosystems
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
- Wildcarded identity-based encryption
- Forward-secure encryption with fast forwarding
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- Traceable policy-based signatures and instantiation from lattices
- Generic constructions of integrated PKE and PEKS
This page was built for publication: Advances in Cryptology - EUROCRYPT 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5307255)