Advances in Cryptology – CRYPTO 2004
From MaRDI portal
Publication:5311549
DOI10.1007/B99099zbMATH Open1104.94019DBLPconf/crypto/2004OpenAlexW2477011922MaRDI QIDQ5311549FDOQ5311549
Authors: Dan Boneh, Xavier Boyen
Publication date: 23 August 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b99099
Recommendations
Cited In (only showing first 100 items - show all)
- Efficient Tate pairing computation using double-base chains
- Adaptively secure distributed PRFs from \(\mathsf{LWE}\)
- Title not available (Why is that?)
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Proxy Re-signature Schemes Without Random Oracles
- Reducing elliptic curve logarithms to logarithms in a finite field
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- An identity-based encryption scheme with compact ciphertexts
- Efficient selective identity-based encryption without random oracles
- Identity-based broadcast encryption with shorter transmissions
- Formal Security Treatments for Signatures from Identity-Based Encryption
- Locally verifiable signature and key aggregation
- Security proofs for identity-based identification and signature schemes
- A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model
- On Constructing Pairing-Free Identity-Based Encryptions
- A strong provably secure IBE scheme without bilinear map
- Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
- Adaptively secure distributed PRFs from LWE
- Predicate encryption supporting disjunctions, polynomial equations, and inner products
- Programmable hash functions and their applications
- Fast, compact, and expressive attribute-based encryption
- Fast, compact, and expressive attribute-based encryption
- Leakage-resilient functional encryption via pair encodings
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- On tight security proofs for Schnorr signatures
- Secure identity-based encryption in the quantum random oracle model
- Lattice-based completely non-malleable public-key encryption in the standard model
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Cryptanalysis of an identity based broadcast encryption scheme without random oracles
- Algebraic partitioning: fully compact and (almost) tightly secure cryptography
- Semi-adaptive security and bundling functionalities made generic and easy
- Efficient IBE with tight reduction to standard assumption in the multi-challenge setting
- Fully CCA2 secure identity based broadcast encryption without random oracles
- Verifiable random functions: relations to identity-based key encapsulation and new constructions
- Tightly Secure IBE Under Constant-Size Master Public Key
- Shorter identity-based encryption via asymmetric pairings
- Breaking an ID-based encryption based on discrete logarithm and factorization problems
- Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
- Zero-knowledge succinct non-interactive arguments of knowledge based on sets of polynomials
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
- Predictable arguments of knowledge
- An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
- Ring-based identity based encryption -- asymptotically shorter MPK and tighter security
- Compact structure-preserving signatures with almost tight security
- Two-dimensional representation of cover free families and its applications: short signatures and more
- Attribute-based signatures
- Verifiable security of Boneh-Franklin identity-based encryption
- Secure public-key encryption scheme without random oracles
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Bonsai trees, or how to delegate a lattice basis
- Scalable zero knowledge via cycles of elliptic curves
- Identity-Based Strong Key-Insulated Signature Without Random Oracles
- Fully leakage-resilient signatures
- Practical Identity-Based Encryption Without Random Oracles
- Adaptive-ID Secure Revocable Identity-Based Encryption
- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power
- Somewhere statistically binding commitment schemes with applications
- Revocable identity-based encryption with server-aided ciphertext evolution
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Cumulatively all-lossy-but-one trapdoor functions from standard assumptions
- Towards tightly secure lattice short signature and id-based encryption
- Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
- Identity Based Encryption Without Redundancy
- Confined guessing: new signatures from standard assumptions
- Identity-based matchmaking encryption from standard assumptions
- Deterministic public-key encryption for adaptively-chosen plaintext distributions
- Tightly secure (H)IBE in the random oracle model
- Ephemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environments
- Cocks IBE scheme
- Lower bounds on assumptions behind registration-based encryption
- Beyond software watermarking: traitor-tracing for pseudorandom functions
- Predicate signatures from pair encodings via dual system proof technique
- Fully secure functional encryption with a large class of relations from the decisional linear assumption
- Privacy-preserving encryption scheme using DNA parentage test
- The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
- Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security
- A survey on functional encryption
- Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
- Verifiable random functions from non-interactive witness-indistinguishable proofs
- Augmented random oracles
- Generic constructions of revocable identity-based encryption
- Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption
- Adaptive-Secure VRFs with Shorter Keys from Static Assumptions
- Extended dual system group and shorter unbounded hierarchical identity based encryption
- One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model
- Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption
- Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness
- Verifiable random functions from standard assumptions
- Identity-based encryption from LWE with more compact master public key
- Registered functional encryptions from pairings
- Time-lock puzzles with efficient batch solving
- Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings
This page was built for publication: Advances in Cryptology – CRYPTO 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5311549)