Advances in Cryptology – CRYPTO 2004

From MaRDI portal
Publication:5311549

DOI10.1007/b99099zbMath1104.94019OpenAlexW2477011922WikidataQ27980744 ScholiaQ27980744MaRDI QIDQ5311549

Dan Boneh, Xavier Boyen

Publication date: 23 August 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b99099




Related Items (92)

Generic Constructions of Revocable Identity-Based EncryptionTwo-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and MoreFast, Compact, and Expressive Attribute-Based EncryptionThe Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOEfficient subtree-based encryption for fuzzy-entity data sharingAttribute-based signatures from lattices: unbounded attributes and semi-adaptive securityAdaptively secure distributed PRFs from LWECocks IBE SchemeExtended dual system group and shorter unbounded hierarchical identity based encryptionPredicate encryption supporting disjunctions, polynomial equations, and inner productsSomewhere statistically binding commitment schemes with applicationsSemi-adaptive Security and Bundling Functionalities Made Generic and EasyFully leakage-resilient signaturesOne-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard modelReducing elliptic curve logarithms to logarithms in a finite fieldTightly CCA-secure identity-based encryption with ciphertext pseudorandomnessBonsai trees, or how to delegate a lattice basisAn identity-based encryption scheme with compact ciphertextsScalable zero knowledge via cycles of elliptic curvesTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionEfficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge SettingPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsShorter identity-based encryption via asymmetric pairingsBreaking an ID-based encryption based on discrete logarithm and factorization problemsPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessConstruction of a Hybrid HIBE Protocol Secure Against Adaptive AttacksFormal Security Treatments for Signatures from Identity-Based EncryptionLocally verifiable signature and key aggregationOn Constructing Pairing-Free Identity-Based EncryptionsOn tight security proofs for Schnorr signaturesAn Efficient and Provable Secure Identity-Based Identification Scheme in the Standard ModelReinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded settingCumulatively all-lossy-but-one trapdoor functions from standard assumptionsIdentity-based matchmaking encryption from standard assumptionsBeyond software watermarking: traitor-tracing for pseudorandom functionsIdentity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear AssumptionAdaptive-Secure VRFs with Shorter Keys from Static AssumptionsA survey on functional encryptionAugmented random oraclesZero-knowledge succinct non-interactive arguments of knowledge based on sets of polynomialsRelations between semantic security and anonymity in identity-based encryptionCryptanalysis of an identity based broadcast encryption scheme without random oraclesProgrammable hash functions and their applicationsRing-based identity based encryption -- asymptotically shorter MPK and tighter securityFully secure unbounded zero inner product encryption with short ciphertexts and keysAdaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroupsLattice-based completely non-malleable public-key encryption in the standard modelIdentity-based broadcast encryption with shorter transmissionsEfficient selective identity-based encryption without random oraclesIdentity-Based Broadcast Encryption with Constant Size Ciphertexts and Private KeysAn efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problemFast, compact, and expressive attribute-based encryptionSecure public-key encryption scheme without random oraclesEfficient Tate pairing computation using double-base chainsDeterministic public-key encryption for adaptively-chosen plaintext distributionsCompact structure-preserving signatures with almost tight securityPredictable Arguments of KnowledgeTightly Secure IBE Under Constant-Size Master Public KeyPredicate signatures from pair encodings via dual system proof techniqueFully secure functional encryption with a large class of relations from the decisional linear assumptionPractical Identity-Based Encryption Without Random OraclesConfined guessing: new signatures from standard assumptionsFully CCA2 secure identity based broadcast encryption without random oraclesProtecting against key-exposure: strongly key-insulated encryption with optimal thresholdVerifiable random functions from non-interactive witness-indistinguishable proofsAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographyVerifiable Random Functions from Standard AssumptionsSecure administration of cryptographic role-based access control for large-scale cloud storage systemsFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelProxy Re-signature Schemes Without Random OraclesA Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption PowerAttribute-Based SignaturesIdentity-Based Threshold Key-Insulated Encryption without Random OraclesAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Adaptive-ID Secure Revocable Identity-Based EncryptionA variant of Boneh-Franklin IBE with a tight reduction in the random oracle modelA strong provably secure IBE scheme without bilinear mapVerifiable random functions: relations to identity-based key encapsulation and new constructionsLeakage-Resilient Functional Encryption via Pair EncodingsChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionSearchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensionsVerifiable Security of Boneh-Franklin Identity-Based EncryptionEfficient adaptively-secure IB-KEMs and VRFs via near-collision resistanceNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsVerifiable random functions with optimal tightnessRevocable identity-based encryption with server-aided ciphertext evolutionDirect chosen-ciphertext secure identity-based key encapsulation without random oraclesNew Techniques for Dual System Encryption and Fully Secure HIBE with Short CiphertextsEphemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environmentsSecure Hierarchical Identity Based Encryption Scheme in the Standard ModelAdaptively secure constrained pseudorandom functions in the standard modelPrivacy-preserving encryption scheme using DNA parentage test




This page was built for publication: Advances in Cryptology – CRYPTO 2004