General Ad Hoc Encryption from Exponent Inversion IBE
From MaRDI portal
Publication:5429403
Recommendations
- Generalized IBE in the exponent-inversion framework
- Efficient selective identity-based encryption without random oracles
- Identity-Based Encryption from the Weil Pairing
- Hierarchical Identity Based Encryption with Polynomially Many Levels
- Identity-based encryption and hierarchical identity-based encryption
Cited in
(12)- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Generalized IBE in the exponent-inversion framework
- Efficient selective identity-based encryption without random oracles
- Attribute-based encryption schemes with constant-size ciphertexts
- Programmable hash functions and their applications
- Déjà Q: encore! Un petit IBE
- Programmable Hash Functions and Their Applications
- Distributed key generation for SM9-based systems
- Revocable hierarchical identity-based encryption with shorter private keys and update keys
- Boneh-Boyen IBE
- Chosen ciphertext secure fuzzy identity based encryption without ROM
- Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
This page was built for publication: General Ad Hoc Encryption from Exponent Inversion IBE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5429403)