Generic constructions of integrated PKE and PEKS
From MaRDI portal
Publication:5963369
DOI10.1007/S10623-014-0014-XzbMATH Open1344.94040OpenAlexW2068879357MaRDI QIDQ5963369FDOQ5963369
Jiang Zhang, Dongdai Lin, Zhenfeng Zhang, Yu Chen
Publication date: 19 February 2016
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-014-0014-x
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Short signatures without random oracles and the SDH assumption in bilinear groups
- A Closer Look at Anonymity and Robustness in Encryption Schemes
- On the Joint Security of Encryption and Signature, Revisited
- Robust Encryption
- Trapdoors for hard lattices and new cryptographic constructions
- Bonsai Trees, or How to Delegate a Lattice Basis
- Efficient Lattice (H)IBE in the Standard Model
- Practical Identity-Based Encryption Without Random Oracles
- Conjunctive, Subset, and Range Queries on Encrypted Data
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Hierarchical ID-Based Cryptography
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Identity-Based Encryption from the Weil Pairing
- Robust Encryption, Revisited
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Nonmalleable Cryptography
- Theory of Cryptography
- Advances in Cryptology - EUROCRYPT 2004
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More
- Advances in Cryptology - EUROCRYPT 2004
- Public Key Encryption That Allows PIR Queries
- Decryptable Searchable Encryption
- On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search
- Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption
- Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption
- Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Perfect Keyword Privacy in PEKS Systems
Cited In (3)
Recommendations
- A Generic Construction of Integrated Secure-Channel Free PEKS and PKE 👍 👎
- Generic Constructions of Parallel Key-Insulated Encryption 👍 👎
- Topics in Cryptology – CT-RSA 2004 👍 👎
- Generic Constructions of Stateful Public Key Encryption and Their Applications 👍 👎
- Generic constructions of identity-based and certificateless kEMs 👍 👎
- Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE 👍 👎
- Public Key Cryptography - PKC 2005 👍 👎
- A Generic Construction for Token-Controlled Public Key Encryption 👍 👎
- Novel generic construction of leakage-resilient PKE scheme with CCA security 👍 👎
This page was built for publication: Generic constructions of integrated PKE and PEKS
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5963369)