Chosen‐Ciphertext Security from Identity‐Based Encryption

From MaRDI portal
Publication:5422487

DOI10.1137/S009753970544713XzbMath1138.94010OpenAlexW1973801321WikidataQ121818957 ScholiaQ121818957MaRDI QIDQ5422487

Dan Boneh, Ran Canetti, Shai Halevi, Jonathan N. Katz

Publication date: 22 October 2007

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1137/s009753970544713x



Related Items

Standard model leakage-resilient authenticated key exchange using inner-product extractors, Relations between robustness and RKA security under public-key encryption, Verifiable Inner Product Encryption Scheme, Trapdoors for Ideal Lattices with Applications, Reproducible Circularly-Secure Bit Encryption: Applications and Realizations, Lattice-based IBE with equality test supporting flexible authorization in the standard model, Anonymous IBE, leakage resilience and circular security from new assumptions, Constructing ID-based cryptographic technique for IFP and GDLP based cryptosystem, Constructions of CCA-Secure Revocable Identity-Based Encryption, On the security of joint signature and encryption revisited, On the Impossibility of Strong Encryption Over $\aleph_0$, Efficient revocable identity-based encryption with short public parameters, Key regeneration-free ciphertext-policy attribute-based encryption and its application, Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions, Bonsai trees, or how to delegate a lattice basis, Identity-based encryption with hierarchical key-insulation in the standard model, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, Augmented Learning with Errors: The Untapped Potential of the Error Term, An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem, Unique-path identity based encryption with applications to strongly secure messaging, CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts, Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks, A new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channels, Forward-secure ID based digital signature scheme with forward-secure private key generator, Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds), Reproducible circularly secure bit encryption: applications and realizations, A lattice-based forward secure IBE scheme for Internet of things, Practical chosen ciphertext secure encryption from factoring, Secure integration of asymmetric and symmetric encryption schemes, Tightly CCA-secure encryption scheme in a multi-user setting with corruptions, An ID-based cryptographic mechanisms based on GDLP and IFP, Efficient selective identity-based encryption without random oracles, Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts, An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem, Efficient identity-based encryption with hierarchical key-insulation from HIBE, Strongly secure authenticated key exchange from factoring, codes, and lattices, Secure public-key encryption scheme without random oracles, Efficient public-key encryption with equality test from lattices, CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN, New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem, Robust encryption, Revocable Identity-Based Encryption Revisited: Security Model and Construction, Improved (Hierarchical) Inner-Product Encryption from Lattices, Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited, Chosen-Ciphertext Secure Fully Homomorphic Encryption, Efficient hybrid encryption from ID-based encryption, Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?, Generic construction of designated tester public-key encryption with keyword search, Generalized Identity Based and Broadcast Encryption Schemes, Generic constructions of integrated PKE and PEKS, CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption, Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman, Practical Chosen Ciphertext Secure Encryption from Factoring, CCA-security from adaptive all-but-one lossy trapdoor functions, One-Time Signatures and Chameleon Hash Functions, Building Key-Private Public-Key Encryption Schemes, Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption, Efficient fully CCA-secure predicate encryptions from pair encodings, Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity, Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN, Direct chosen-ciphertext secure identity-based key encapsulation without random oracles, A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems, Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs, Robust Encryption, An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment, On the Construction of Public Key Encryption with Sender Recovery, Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE, Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles