Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
From MaRDI portal
Publication:5757693
Recommendations
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- A modular analysis of the Fujisaki-Okamoto transformation
- scientific article; zbMATH DE number 1617925
- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations
- Public Key Cryptography - PKC 2006
Cited in
(8)- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
- Converting PKI-based authenticated key exchange to identity-based
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- New technique for chosen-ciphertext security based on non-interactive zero-knowledge
- \textsf{Transform} without \textsf{encode} is not sufficient for SIFA and FTA security: a case study
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
- scientific article; zbMATH DE number 1617925 (Why is no real title available?)
This page was built for publication: Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5757693)