Identity-Based Threshold Key-Insulated Encryption without Random Oracles
From MaRDI portal
Publication:5458941
DOI10.1007/978-3-540-79263-5_13zbMATH Open1153.94437OpenAlexW1787137233MaRDI QIDQ5458941FDOQ5458941
Kefei Chen, Jian Weng, Weidong Qiu, Shengli Liu, Dong Zheng
Publication date: 24 April 2008
Published in: Topics in Cryptology β CT-RSA 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-79263-5_13
Cites Work
- Identity-Based Cryptosystems and Signature Schemes
- Practical Identity-Based Encryption Without Random Oracles
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Theory of Cryptography
- How to withstand mobile virus attacks (extended abstract)
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Advances in Cryptology - EUROCRYPT 2004
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
- Strong Key-Insulated Signature Schemes
- Title not available (Why is that?)
- Advances in Cryptology β CRYPTO 2004
- Public Key Cryptography - PKC 2006
- Title not available (Why is that?)
- Topics in Cryptology β CT-RSA 2005
- Timed-Release and Key-Insulated Public Key Encryption
- Title not available (Why is that?)
- Title not available (Why is that?)
- HIBE With Short Public Parameters Without Random Oracle
- Parallel Key-Insulated Public Key Encryption Without Random Oracles
- Topics in Cryptology β CT-RSA 2004
- Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction
- Efficient Intrusion-Resilient Signatures Without Random Oracles
- Information and Communications Security
- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles
- Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption
Cited In (11)
- Title not available (Why is that?)
- Efficient identity-based encryption with hierarchical key-insulation from HIBE
- Identity-based encryption with hierarchical key-insulation in the standard model
- Attribute-based key-insulated signature and its applications
- Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
- An improved certificateless strong key-insulated signature scheme in the standard model
- An efficient threshold key-insulated signature scheme
- Revocable hierarchical identity-based encryption
- Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
- Revocable Identity-Based Encryption Revisited: Security Model and Construction
Recommendations
- Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction π π
- Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles π π
- Identity-based encryption with hierarchical key-insulation in the standard model π π
- Identity-Based Strong Key-Insulated Signature Without Random Oracles π π
- Forward-secure identity-based public-key encryption without random oracles π π
This page was built for publication: Identity-Based Threshold Key-Insulated Encryption without Random Oracles
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458941)