Public Key Cryptography - PKC 2006
From MaRDI portal
Publication:5898949
Recommendations
- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
- Towards forward security properties for PEKS and IBE
- Extensions of IBE and related primitives
- Limits on the power of garbling techniques for public-key encryption
- On the security of a convertible authenticated encryption
- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations
- Strong cryptography from weak secrets. Building efficient PKE and IBE from distributed passwords
- IBE with tight security against selective opening and chosen-ciphertext attacks
- Reducing the spread of damage of key exposures in key-insulated encryption
- A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption
Cited in
(10)- Efficient hybrid encryption from ID-based encryption
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations
- An efficient IBE scheme with tight security reduction in the random oracle model
- A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
- The Boneh-Katz transformation, revisited: pseudorandom/obliviously-samplable PKE from lattices and codes and its application
- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
This page was built for publication: Public Key Cryptography - PKC 2006
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5898949)