Identity-Based Threshold Key-Insulated Encryption without Random Oracles
From MaRDI portal
Publication:5458941
Recommendations
- Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction
- Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
- Identity-based encryption with hierarchical key-insulation in the standard model
- Identity-Based Strong Key-Insulated Signature Without Random Oracles
- Forward-secure identity-based public-key encryption without random oracles
Cites work
- scientific article; zbMATH DE number 1942440 (Why is no real title available?)
- scientific article; zbMATH DE number 1952892 (Why is no real title available?)
- scientific article; zbMATH DE number 1962140 (Why is no real title available?)
- scientific article; zbMATH DE number 1980951 (Why is no real title available?)
- scientific article; zbMATH DE number 2009960 (Why is no real title available?)
- scientific article; zbMATH DE number 2086699 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- scientific article; zbMATH DE number 1418310 (Why is no real title available?)
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient Intrusion-Resilient Signatures Without Random Oracles
- HIBE With Short Public Parameters Without Random Oracle
- How to withstand mobile virus attacks (extended abstract)
- Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction
- Identity-based cryptosystems and signature schemes
- Information and Communications Security
- Parallel Key-Insulated Public Key Encryption Without Random Oracles
- Practical Identity-Based Encryption Without Random Oracles
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
- Public Key Cryptography - PKC 2006
- Reducing the spread of damage of key exposures in key-insulated encryption
- Strong Key-Insulated Signature Schemes
- Theory of Cryptography
- Timed-Release and Key-Insulated Public Key Encryption
- Topics in Cryptology – CT-RSA 2004
- Topics in Cryptology – CT-RSA 2005
Cited in
(17)- An improved certificateless strong key-insulated signature scheme in the standard model
- Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
- Revocable identity-based encryption revisited: security model and construction
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
- Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction
- Multi-Identity Single-Key Decryption without Random Oracles
- Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem
- Identity-based encryption with hierarchical key-insulation in the standard model
- Attribute-based key-insulated signature and its applications
- Identity-based key-insulated signcryption
- Revocable hierarchical identity-based encryption
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
- IRIBE: intrusion-resilient identity-based encryption
- scientific article; zbMATH DE number 1980951 (Why is no real title available?)
- Parallel Key-Insulated Public Key Encryption Without Random Oracles
- Efficient identity-based encryption with hierarchical key-insulation from HIBE
- An efficient threshold key-insulated signature scheme
This page was built for publication: Identity-Based Threshold Key-Insulated Encryption without Random Oracles
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458941)