Information Security and Cryptology - ICISC 2005
From MaRDI portal
Publication:5899301
DOI10.1007/11734727zbMATH Open1184.94235OpenAlexW2493058093MaRDI QIDQ5899301FDOQ5899301
Authors: Sanjit Chatterjee, Palash Sarkar
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11734727
Recommendations
- Adaptively secure efficient lattice (H)IBE in standard model with short public parameters
- An efficient IBE scheme with tight security reduction in the random oracle model
- Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption
- Efficient Identity-Based Encryption with Tight Security Reduction
- Practical Identity-Based Encryption Without Random Oracles
Cited In (20)
- Efficient hybrid encryption from ID-based encryption
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Sequential aggregate signatures with short public keys: design, analysis and implementation studies
- Batch verification of short signatures
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Proxy Re-signature Schemes Without Random Oracles
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
- Practical Short Signature Batch Verification
- Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles
- Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
- A survey on functional encryption
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Adaptively secure efficient lattice (H)IBE in standard model with short public parameters
- Wildcarded identity-based encryption
- An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model
- Comparing two pairing-based aggregate signature schemes
- Relations between semantic security and anonymity in identity-based encryption
- ID-based public key cryptographic systems
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
This page was built for publication: Information Security and Cryptology - ICISC 2005
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5899301)