Efficient Identity-Based Encryption Without Random Oracles

From MaRDI portal
Publication:5385725

DOI10.1007/11426639_7zbMath1137.94360OpenAlexW1592092778MaRDI QIDQ5385725

Brent Waters

Publication date: 6 May 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11426639_7



Related Items

An efficient IBE scheme with tight security reduction in the random oracle model, Self-updatable encryption with short public parameters and its extensions, Generic construction for tightly-secure signatures from discrete log, Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability, SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions, Efficient subtree-based encryption for fuzzy-entity data sharing, Adaptively secure distributed PRFs from LWE, Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security, Short variable length domain extenders with beyond birthday bound security, Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares, Certificateless signcryption scheme in the standard model, Unconditionally anonymous ring and mesh signatures, Memory lower bounds of reductions revisited, On the security of two identity-based conditional proxy re-encryption schemes, Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions, Bonsai trees, or how to delegate a lattice basis, Linearly homomorphic structure-preserving signatures and their applications, An identity-based encryption scheme with compact ciphertexts, Strong key-insulated signature in the standard model, Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications, Shorter identity-based encryption via asymmetric pairings, Certificateless key-insulated signature without random oracles, Breaking an ID-based encryption based on discrete logarithm and factorization problems, Forward-secure identity-based signature: security notions and construction, Timed-release computational secret sharing and threshold encryption, Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security, Non-interactive multisignatures in the plain public-key model with efficient verification, Efficient authentication from hard learning problems, Provably secure certificate-based encryption with leakage resilience, Relations between semantic security and anonymity in identity-based encryption, Cryptanalysis of an identity based broadcast encryption scheme without random oracles, Efficient traceable signatures in the standard model, Revocable hierarchical identity-based encryption via history-free approach, Programmable hash functions and their applications, Provably secure server-aided verification signatures, Accountable authority key policy attribute-based encryption, Improved inner-product encryption with adaptive security and full attribute-hiding, Certificate-based verifiably encrypted signatures from pairings, Identity-based broadcast encryption with shorter transmissions, Chosen ciphertext secure fuzzy identity based encryption without ROM, Efficient selective identity-based encryption without random oracles, Optimistic fair exchange in the enhanced chosen-key model, Concurrent signature without random oracles, An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem, Secure public-key encryption scheme without random oracles, Public key encryption with keyword search secure against keyword guessing attacks without random oracle, Certificateless threshold signature secure in the standard model, Certificate-based proxy decryption systems with revocability in the standard model, Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES, Simplified small exponent test for batch verification, Practical verifiably encrypted signatures without random oracles, Security analysis of an identity-based strongly unforgeable signature scheme, All-but-many encryption, Subversion-resilient signatures: definitions, constructions and applications, Computational friendly attribute-based encryptions with short ciphertext, Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model, Identity-based quotable ring signature, New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem, IRIBE: intrusion-resilient identity-based encryption, Efficient Tate pairing computation using double-base chains, Deterministic public-key encryption for adaptively-chosen plaintext distributions, Security models for certificateless signature schemes revisited, Attacks on one designated verifier proxy signature scheme, Universal designated verifier signature scheme with non-delegatability in the standard model, Comparing two pairing-based aggregate signature schemes, Self-generated-certificate public key encryption without pairing and its application, Efficient certificateless threshold signatures without random oracles, Designated verifier proxy signature scheme without random oracles, Hidden attribute-based signatures without anonymity revocation, Generic security-amplifying methods of ordinary digital signatures, Confined guessing: new signatures from standard assumptions, Fully CCA2 secure identity based broadcast encryption without random oracles, Identity-based trapdoor mercurial commitments and applications, Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis, Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model, Certificate-free \textit{ad hoc} anonymous authentication, An identity-based strongly unforgeable signature without random oracles from bilinear pairings, Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts, Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model, Novel generic construction of leakage-resilient PKE scheme with CCA security, Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key, Adaptively secure distributed PRFs from \(\mathsf{LWE}\), Efficient public key encryption with smallest ciphertext expansion from factoring, A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model, A strong provably secure IBE scheme without bilinear map, Verifiable random functions: relations to identity-based key encapsulation and new constructions, Generic construction of server-aided revocable hierarchical identity-based encryption, An efficient CCA-secure access control encryption for any policy, Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions, Impossibility on tamper-resilient cryptography with uniqueness properties, Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance, Verifiable random functions with optimal tightness, Ring signatures: Stronger definitions, and constructions without random oracles, Wildcarded identity-based encryption from lattices, Direct chosen-ciphertext secure identity-based key encapsulation without random oracles, An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment, Adaptively secure constrained pseudorandom functions in the standard model, Reverse firewalls for actively secure MPCs, Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE, Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles, Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption, Generic Constructions of Revocable Identity-Based Encryption, Hierarchical Identity-Based Encryption with Tight Multi-challenge Security, The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO, Almost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and More, A more efficient accountable authority IBE scheme under the DL assumption, Boneh-Boyen IBE, Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing, New Proof for BKP IBE Scheme and Improvement in the MIMC Setting, Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016, Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions, Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting, Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions, Semi-adaptive Security and Bundling Functionalities Made Generic and Easy, IBE Under $$k$$-LIN with Shorter Ciphertexts and Private Keys, Constructions of CCA-Secure Revocable Identity-Based Encryption, Reducing elliptic curve logarithms to logarithms in a finite field, Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps, Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction, Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks, A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function, Practical Threshold Signatures Without Random Oracles, Formal Security Treatments for Signatures from Identity-Based Encryption, Traceable Identity-Based Group Signature, An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model, The Kernel Matrix Diffie-Hellman Assumption, Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions, Efficient One-Round Key Exchange in the Standard Model, New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters, Certificate-Based Signature Schemes without Pairings or Random Oracles, Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, Blind Identity-Based Encryption and Simulatable Oblivious Transfer, Two Efficient Tag-Based Encryption Schemes on Lattices, New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model, SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption, A Signature Scheme with Efficient Proof of Validity, Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security, Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model, Revocable Identity-Based Encryption Revisited: Security Model and Construction, Improved (Hierarchical) Inner-Product Encryption from Lattices, Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages, Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures, Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES, Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies, Efficient Certificateless KEM in the Standard Model, Factor-4 and 6 compression of cyclotomic subgroups of and, Tightly Secure IBE Under Constant-Size Master Public Key, Compact Group Signatures Without Random Oracles, Practical Identity-Based Encryption Without Random Oracles, Sequential Aggregate Signatures and Multisignatures Without Random Oracles, Programmable Hash Functions and Their Applications, Unlinkable Randomizable Signature and Its Application in Group Signature, Multi-Identity Single-Key Decryption without Random Oracles, Tracing Malicious Proxies in Proxy Re-encryption, Identity-Based Online/Offline Encryption, Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption, Verifiable random functions from non-interactive witness-indistinguishable proofs, Generic constructions of integrated PKE and PEKS, Tighter security proofs for GPV-IBE in the quantum random oracle model, Proxy Re-signature Schemes Without Random Oracles, A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power, Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles, Attribute-Based Signatures, Identity-Based Threshold Key-Insulated Encryption without Random Oracles, CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption, Multi-identity management for identity-based cryptography, Adaptive-ID Secure Revocable Identity-Based Encryption, An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations, Practical Short Signature Batch Verification, Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening, Tightly secure hierarchical identity-based encryption, Realizing Hash-and-Sign Signatures under Standard Assumptions, Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme, Verifiable Random Functions from Identity-Based Key Encapsulation, Building Key-Private Public-Key Encryption Schemes, An efficient certificateless multi-receiver threshold decryption scheme, On the Theoretical Gap between Group Signatures with and without Unlinkability, Certified Encryption Revisited, Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems, Anonymity from Public Key Encryption to Undeniable Signatures, Verifiable Security of Boneh-Franklin Identity-Based Encryption, Efficient Identity-Based Signcryption in the Standard Model, Secure Obfuscation of Encrypted Verifiable Encrypted Signatures, Identity-Based Trace and Revoke Schemes, Security of Verifiably Encrypted Signatures and a Construction without Random Oracles, Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures, Identity Based Group Signatures from Hierarchical Identity-Based Encryption, Forward-Secure Group Signatures from Pairings, Efficient Traceable Signatures in the Standard Model, Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption, New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs, Sanitizable Signatures Revisited, Secure Hierarchical Identity Based Encryption Scheme in the Standard Model, Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based Signatures, Optimal Online/Offline Signature: How to Sign a Message without Online Computation, Round-Optimal Blind Signatures from Waters Signatures, Secure Proxy Multi-signature Scheme in the Standard Model, Server-Aided Verification Signatures: Definitions and New Constructions, Adequate Elliptic Curves for Computing the Product of n Pairings, Multi-authority attribute-based encryption with honest-but-curious central authority, Short Attribute-Based Signatures for Threshold Predicates, New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications, Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More, Extended dual system group and shorter unbounded hierarchical identity based encryption, Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles, Predicate encryption supporting disjunctions, polynomial equations, and inner products, Survey of information security, A generic construction of fuzzy signature, Skipping the \(q\) in group signatures, Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience, A pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumption, Identity-based data storage scheme with anonymous key generation in fog computing, An Efficient and Provably Secure Certificate-Based Encryption Scheme, Fully leakage-resilient signatures, Puncturable identity-based and attribute-based encryption from lattices, More efficient structure-preserving signatures -- or: bypassing the type-III lower bounds, Efficient revocable identity-based encryption with short public parameters, Efficient revocable identity-based encryption via subset difference methods, A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes, Efficient and secure attribute-based signature for monotone predicates, Anonymous and leakage resilient IBE and IPE, Efficient traceable ring signature scheme without pairings, Short signatures from Diffie-Hellman: realizing almost compact public key, Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness, Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions, Identity-based encryption with hierarchical key-insulation in the standard model, Forward-secure revocable identity-based encryption, Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption, Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge, A generic construction of tightly secure signatures in the multi-user setting, Adaptive Oblivious Transfer and Generalization, Towards Tightly Secure Lattice Short Signature and Id-Based Encryption, Verifiable Functional Encryption, Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting, Structure-preserving signatures on equivalence classes and constant-size anonymous credentials, On tight security proofs for Schnorr signatures, Generic constructions of identity-based and certificateless kEMs, Forward-secure ID based digital signature scheme with forward-secure private key generator, Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction, Wildcarded identity-based encryption, Inner-product encryption under standard assumptions, Improved hidden vector encryption with short ciphertexts and tokens, Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters, Unbounded HIBE with tight security, Ring-based identity based encryption -- asymptotically shorter MPK and tighter security, On the impossibility of purely algebraic signatures, Direct computation of branching programs and its applications to more efficient lattice-based cryptography, Attribute-based optimistic fair exchange: how to restrict brokers with policies, Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions, Tight security for the generic construction of identity-based signature (in the multi-instance setting), An efficient threshold key-insulated signature scheme, Directed proxy signature in the standard model, Chosen ciphertext secure identity-based broadcast encryption in the standard model, New technique for chosen-ciphertext security based on non-interactive zero-knowledge, Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more, Lattice-based completely non-malleable public-key encryption in the standard model, The relation and transformation between hierarchical inner product encryption and spatial encryption, Certificateless signature scheme with security enhanced in the standard model, Secure identity-based signcryption in the standard model, Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts, Generalized public-key cryptography with tight security, Efficient identity-based encryption with hierarchical key-insulation from HIBE, Anonymous HIBE with short ciphertexts: full security in prime order groups, Efficient hybrid encryption from ID-based encryption, Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism, Protecting against key-exposure: strongly key-insulated encryption with optimal threshold, Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts, A Signature Scheme with a Fuzzy Private Key, Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures, A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model, Novel updatable identity-based hash proof system and its applications, Algebraic Partitioning: Fully Compact and (almost) Tightly Secure Cryptography, Verifiable Random Functions from Standard Assumptions, Reconfigurable Cryptography: A Flexible Approach to Long-Term Security, CCA-Secure Keyed-Fully Homomorphic Encryption, Déjà Q: Encore! Un Petit IBE, Functional Encryption Without Obfuscation, Identity-based proxy re-signatures from lattices, Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups, Identity-based encryption with leakage-amplified chosen-ciphertext attacks security, An improved certificateless strong key-insulated signature scheme in the standard model, Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions, Fuzzy Signatures: Relaxing Requirements and a New Construction, Revocable identity-based encryption with server-aided ciphertext evolution, A fully distributed hierarchical attribute-based encryption scheme, Beta Weil pairing revisited, Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion Using Integer Programming, An alternative approach to public cloud data auditing supporting data dynamics, An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem, Continuous leakage-resilient identity-based encryption with leakage amplification, Tightly secure signature schemes from the LWE and subset sum assumptions, Ephemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environments, A strong designated verifier proxy re-signature scheme for IoT environments, Computing on authenticated data, Sequential aggregate signatures with short public keys without random oracles, Privacy-preserving encryption scheme using DNA parentage test, Explicit formula for optimal ate pairing over cyclotomic family of elliptic curves, Practical (fully) distributed signatures provably secure in the standard model, Partially structure-preserving signatures: lower bounds, constructions and more, Leakage-resilient identity-based cryptography from minimal assumptions, An efficient identity-based signature scheme with provable security, Multi-client inner product encryption: function-hiding instantiations without random oracles, On the security of functional encryption in the generic group model, Identity-based encryption in DDH hard groups, On Constructing Pairing-Free Identity-Based Encryptions, More efficient adaptively secure lattice-based IBE with equality test in the standard model, Certificateless encryption scheme with provable security in the standard model suitable for mobile devices, Trapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hiding, Attribute-based signatures for range of inner product and its applications, Identity-based matchmaking encryption from standard assumptions, The power of undirected rewindings for adaptive security, Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption, A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion, A survey on functional encryption, More efficient verifiable functional encryption, Lattice-based programmable hash functions and applications, Complementary set encryption for privacy-preserving data consolidation