CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
From MaRDI portal
Publication:5458942
DOI10.1007/978-3-540-79263-5_14zbMATH Open1153.94400OpenAlexW2151874514WikidataQ59163738 ScholiaQ59163738MaRDI QIDQ5458942FDOQ5458942
Authors: Eike Kiltz, Yevgeniy Vahlis
Publication date: 24 April 2008
Published in: Topics in Cryptology – CT-RSA 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-79263-5_14
Recommendations
- CCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applications
- CCA2 key-privacy for code-based encryption in the standard model
- CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
- A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
- Topics in Cryptology – CT-RSA 2005
- An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model
- Efficient CCA-Secure PKE from Identity-Based Techniques
- Efficient Certificate-Based Encryption in the Standard Model
- More efficient CCA-secure identity-based dual receiver encryption
Cites Work
- The exact security of digital signatures -- how to sign with RSA and Rabin
- Identity-based cryptosystems and signature schemes
- Practical Identity-Based Encryption Without Random Oracles
- Title not available (Why is that?)
- Hierarchical ID-Based Cryptography
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Identity-Based Encryption from the Weil Pairing
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Theory of Cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Advances in Cryptology – CRYPTO 2004
- Title not available (Why is that?)
- Security Analysis of the Strong Diffie-Hellman Problem
- On the Generic Insecurity of the Full Domain Hash
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- Information Security and Cryptology - ICISC 2005
Cited In (20)
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- An efficient IBE scheme with tight security reduction in the random oracle model
- An ID-based cryptographic mechanisms based on GDLP and IFP
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model
- On the Impossibility of Strong Encryption Over $\aleph_0$
- CCA-secure inner-product functional encryption from projective hash functions
- Programmable hash functions and their applications
- Efficient identity-based signcryption in the standard model
- Accountable authority key policy attribute-based encryption
- Topics in Cryptology – CT-RSA 2005
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
- Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- Chosen ciphertext secure fuzzy identity based encryption without ROM
- CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
- Constructions of CCA-Secure Revocable Identity-Based Encryption
Uses Software
This page was built for publication: CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458942)