Information Security and Cryptology - ICISC 2005
From MaRDI portal
Publication:5899301
Recommendations
- Adaptively secure efficient lattice (H)IBE in standard model with short public parameters
- An efficient IBE scheme with tight security reduction in the random oracle model
- Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption
- Efficient Identity-Based Encryption with Tight Security Reduction
- Practical Identity-Based Encryption Without Random Oracles
Cited in
(20)- Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles
- Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
- Batch verification of short signatures
- ID-based public key cryptographic systems
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- Adaptively secure efficient lattice (H)IBE in standard model with short public parameters
- An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Comparing two pairing-based aggregate signature schemes
- Relations between semantic security and anonymity in identity-based encryption
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Efficient hybrid encryption from ID-based encryption
- Practical Short Signature Batch Verification
- Wildcarded identity-based encryption
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Proxy Re-signature Schemes Without Random Oracles
- Sequential aggregate signatures with short public keys: design, analysis and implementation studies
- A survey on functional encryption
This page was built for publication: Information Security and Cryptology - ICISC 2005
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5899301)