CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
From MaRDI portal
Publication:5458942
DOI10.1007/978-3-540-79263-5_14zbMath1153.94400OpenAlexW2151874514WikidataQ59163738 ScholiaQ59163738MaRDI QIDQ5458942
Publication date: 24 April 2008
Published in: Topics in Cryptology – CT-RSA 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-79263-5_14
Related Items (18)
An efficient IBE scheme with tight security reduction in the random oracle model ⋮ Constructions of CCA-Secure Revocable Identity-Based Encryption ⋮ On the Impossibility of Strong Encryption Over $\aleph_0$ ⋮ An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem ⋮ Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts ⋮ Programmable hash functions and their applications ⋮ Accountable authority key policy attribute-based encryption ⋮ An ID-based cryptographic mechanisms based on GDLP and IFP ⋮ Chosen ciphertext secure fuzzy identity based encryption without ROM ⋮ An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem ⋮ Public key encryption with keyword search secure against keyword guessing attacks without random oracle ⋮ Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model ⋮ CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions ⋮ A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model ⋮ CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption ⋮ Efficient Identity-Based Signcryption in the Standard Model ⋮ An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem ⋮ Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- Identity-Based Cryptosystems and Signature Schemes
- Security Analysis of the Strong Diffie-Hellman Problem
- Practical Identity-Based Encryption Without Random Oracles
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Hierarchical ID-Based Cryptography
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- On the Generic Insecurity of the Full Domain Hash
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Theory of Cryptography
- Information Security and Cryptology - ICISC 2005
This page was built for publication: CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption