Tightly Secure IBE Under Constant-Size Master Public Key
From MaRDI portal
Publication:5738788
DOI10.1007/978-3-662-54365-8_9zbMath1404.94051OpenAlexW2591926943MaRDI QIDQ5738788
Junqing Gong, Jie Chen, Jian Weng
Publication date: 13 June 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://hal.inria.fr/hal-01643457/file/junqing-PKC17.pdf
Related Items (5)
On the security loss of unique signatures ⋮ New Proof for BKP IBE Scheme and Improvement in the MIMC Setting ⋮ Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting ⋮ Master-key KDM-secure ABE via predicate encoding ⋮ Short tightly secure signatures for signing a vector of group elements: a new approach
Cites Work
- Unnamed Item
- Unnamed Item
- Algebraic Partitioning: Fully Compact and (almost) Tightly Secure Cryptography
- Extended Nested Dual System Groups, Revisited
- Déjà Q: Encore! Un Petit IBE
- A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
- A Framework for Identity-Based Encryption with Almost Tight Security
- Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Towards Tightly Secure Lattice Short Signature and Id-Based Encryption
- Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings
- Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting
- Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions
- Identity-Based Cryptosystems and Signature Schemes
- Identity-Based Encryption Secure against Selective Opening Attack
- Number-theoretic constructions of efficient pseudo-random functions
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Practical Identity-Based Encryption Without Random Oracles
- Adaptive Partitioning
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More
- Déjà Q: Using Dual Systems to Revisit q-Type Assumptions
- Theory of Cryptography
- Dual System Encryption via Predicate Encodings
This page was built for publication: Tightly Secure IBE Under Constant-Size Master Public Key