CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
From MaRDI portal
Publication:5458942
Recommendations
- CCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applications
- CCA2 key-privacy for code-based encryption in the standard model
- CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
- A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
- Topics in Cryptology – CT-RSA 2005
- An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model
- Efficient CCA-Secure PKE from Identity-Based Techniques
- Efficient Certificate-Based Encryption in the Standard Model
- More efficient CCA-secure identity-based dual receiver encryption
Cites work
- scientific article; zbMATH DE number 176565 (Why is no real title available?)
- scientific article; zbMATH DE number 1302834 (Why is no real title available?)
- scientific article; zbMATH DE number 1302835 (Why is no real title available?)
- scientific article; zbMATH DE number 1775406 (Why is no real title available?)
- scientific article; zbMATH DE number 2086725 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical ID-Based Cryptography
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Encryption from the Weil Pairing
- Identity-based cryptosystems and signature schemes
- Information Security and Cryptology - ICISC 2005
- On the Generic Insecurity of the Full Domain Hash
- Practical Identity-Based Encryption Without Random Oracles
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Security Analysis of the Strong Diffie-Hellman Problem
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- The exact security of digital signatures -- how to sign with RSA and Rabin
- Theory of Cryptography
Cited in
(20)- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- Accountable authority key policy attribute-based encryption
- A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model
- Programmable hash functions and their applications
- On the Impossibility of Strong Encryption Over $\aleph_0$
- CCA-secure inner-product functional encryption from projective hash functions
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Efficient identity-based signcryption in the standard model
- Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
- Topics in Cryptology – CT-RSA 2005
- Constructions of CCA-Secure Revocable Identity-Based Encryption
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
- An efficient IBE scheme with tight security reduction in the random oracle model
- Chosen ciphertext secure fuzzy identity based encryption without ROM
- An ID-based cryptographic mechanisms based on GDLP and IFP
- An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
This page was built for publication: CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458942)