Blind Identity-Based Encryption and Simulatable Oblivious Transfer
From MaRDI portal
Publication:5387104
DOI10.1007/978-3-540-76900-2_16zbMath1153.94385OpenAlexW2026351MaRDI QIDQ5387104
No author found.
Publication date: 15 May 2008
Published in: Advances in Cryptology – ASIACRYPT 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-76900-2_16
Related Items
Blind attribute-based encryption and oblivious transfer with fine-grained access control, A black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreement, Blind key-generation attribute-based encryption for general predicates, Adaptive Oblivious Transfer and Generalization, Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost, Solutions to the anti-piracy problem in oblivious transfer, Fully-Simulatable Oblivious Set Transfer, Oblivious pseudorandom functions from isogenies, Blind Identity-Based Encryption and Simulatable Oblivious Transfer, Universally Composable Adaptive Oblivious Transfer, Efficient Fully-Simulatable Oblivious Transfer, Identity-Based Threshold Key-Insulated Encryption without Random Oracles, Adaptive oblivious transfer with access control from lattice assumptions, Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme, Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions, Simulatable Adaptive Oblivious Transfer with Statistical Receiver’s Privacy, Universally Composable Adaptive Priced Oblivious Transfer, Identity-based encryption with security against the KGC: a formal model and its instantiations, Round Optimal Universally Composable Oblivious Transfer Protocols
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Efficient signature generation by smart cards
- Oblivious keyword search
- Oblivious transfer and polynomial evaluation
- Identity-Based Cryptosystems and Signature Schemes
- Security Analysis of the Strong Diffie-Hellman Problem
- Practical Identity-Based Encryption Without Random Oracles
- Reducing Trust in the PKG in Identity Based Cryptosystems
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Smooth Projective Hashing and Two-Message Oblivious Transfer
- Efficient Identity-Based Encryption Without Random Oracles
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Simulatable Adaptive Oblivious Transfer
- HIBE With Short Public Parameters Without Random Oracle
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Theory of Cryptography
- Information Security and Cryptology - ICISC 2005
- Theory of Cryptography