Identity-based matchmaking encryption from standard assumptions
From MaRDI portal
Publication:6135441
DOI10.1007/978-3-031-22969-5_14zbMath1519.94086MaRDI QIDQ6135441
No author found.
Publication date: 25 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Related Items (2)
Multi-key and multi-input predicate encryption from learning with errors ⋮ Identity-based matchmaking encryption from standard assumptions
Cites Work
- Unnamed Item
- Unnamed Item
- Shorter identity-based encryption via asymmetric pairings
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Identity-Based Cryptosystems and Signature Schemes
- Unbounded HIBE and Attribute-Based Encryption
- Decentralizing Attribute-Based Encryption
- Some Key Techniques on Pairing Vector Spaces
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Trapdoors for hard lattices and new cryptographic constructions
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Bonsai Trees, or How to Delegate a Lattice Basis
- Efficient Lattice (H)IBE in the Standard Model
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Homomorphic Encryption and Signatures from Vector Decomposition
- Hierarchical Predicate Encryption for Inner-Products
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Shorter IBE and Signatures via Asymmetric Pairings
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More
- Dual System Encryption via Predicate Encodings
- Match me if you can: matchmaking encryption and its applications
- Identity-based matchmaking encryption from standard assumptions
- Identity-based matchmaking encryption without random oracles
This page was built for publication: Identity-based matchmaking encryption from standard assumptions