Advances in Cryptology - EUROCRYPT 2004
From MaRDI portal
Publication:5307255
DOI10.1007/B97182zbMATH Open1122.94358OpenAlexW2477185671MaRDI QIDQ5307255FDOQ5307255
Authors: Ran Canetti, Shai Halevi, Jonathan Katz
Publication date: 25 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b97182
Recommendations
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Identity-based encryption tightly secure under chosen-ciphertext attacks
- Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Chosen ciphertext secure identity-based broadcast encryption in the standard model
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
Cited In (only showing first 100 items - show all)
- Efficient hybrid encryption from ID-based encryption
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- Identity Based Group Signatures from Hierarchical Identity-Based Encryption
- Augmented Learning with Errors: The Untapped Potential of the Error Term
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- A new framework for the design and analysis of identity-based identification schemes
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Efficient selective identity-based encryption without random oracles
- Attribute-based encryption schemes with constant-size ciphertexts
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
- Formal Security Treatments for Signatures from Identity-Based Encryption
- IRIBE: intrusion-resilient identity-based encryption
- Theory of Cryptography
- Theory of Cryptography
- On Constructing Pairing-Free Identity-Based Encryptions
- Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption
- Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption
- Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
- Upgrading to functional encryption
- Extensions of access structures and their cryptographic applications
- Non-malleable encryption: simpler, shorter, stronger
- Fast, compact, and expressive attribute-based encryption
- A new paradigm for public-key functional encryption for degree-2 polynomials
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- An efficient CCA-secure access control encryption for any policy
- Revocable hierarchical identity-based encryption with adaptive security
- Robust encryption, revisited
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- Topics in Cryptology – CT-RSA 2005
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Simulation-based selective opening security for receivers under chosen-ciphertext attacks
- Chosen ciphertext secure authenticated group communication using identity-based signcryption
- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
- Fully CCA2 secure identity based broadcast encryption without random oracles
- Efficient revocable identity-based encryption via subset difference methods
- Short signatures without random oracles and the SDH assumption in bilinear groups
- Adaptively secure non-interactive threshold cryptosystems
- One-time signatures and chameleon hash functions
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Tagged one-time signatures: tight security and optimal tag size
- Efficient completely non-malleable and RKA secure public key encryptions
- Shorter quasi-adaptive NIZK proofs for linear subspaces
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
- Secure integration of asymmetric and symmetric encryption schemes
- IBE with tight security against selective opening and chosen-ciphertext attacks
- Secure public-key encryption scheme without random oracles
- Identity-based encryption tightly secure under chosen-ciphertext attacks
- Robust Encryption
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- Reconciling non-malleability with homomorphic encryption
- Verifiability-based conversion from CPA to CCA-secure predicate encryption
- Practical Identity-Based Encryption Without Random Oracles
- All-in-one group-oriented cryptosystem based on bilinear pairing
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Certificate-based proxy decryption systems with revocability in the standard model
- Chosen ciphertext secure fuzzy identity based encryption without ROM
- Provable secure identity based generalized signcryption scheme
- A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Computational friendly attribute-based encryptions with short ciphertext
- Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- Forward-secure ID based digital signature scheme with forward-secure private key generator
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles
- Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening
- Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles
- Broadcast encryption based non-interactive key distribution in MANETs
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Wildcarded identity-based encryption from lattices
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions
- Non-malleable encryption: simpler, shorter, stronger
- New technique for chosen-ciphertext security based on non-interactive zero-knowledge
- A black-box construction of strongly unforgeable signature scheme in the leakage setting
- Access control encryption from group encryption
- An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption
- Fully secure functional encryption with a large class of relations from the decisional linear assumption
- A generic construction of CCA-secure deterministic encryption
- Signcryption schemes with threshold unsigncryption, and applications
- Identity-based encryption with hierarchical key-insulation in the standard model
- PRE: stronger security notions and efficient construction with non-interactive opening
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
- Robust encryption
- Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman
- Public key encryption with equality test in the standard model
- Efficient fully CCA-secure predicate encryptions from pair encodings
- Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts
- Improved, black-box, non-malleable encryption from semantic security
- Lattice-based completely non-malleable public-key encryption in the standard model
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
- Novel generic construction of leakage-resilient PKE scheme with CCA security
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
- Chosen ciphertext secure identity-based broadcast encryption in the standard model
This page was built for publication: Advances in Cryptology - EUROCRYPT 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5307255)