Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE
From MaRDI portal
Publication:6157526
DOI10.1007/978-3-030-92075-3_15zbMATH Open1514.94138MaRDI QIDQ6157526FDOQ6157526
Authors: Yi Wang, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung
Publication date: 12 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Recommendations
Cites Work
- Identity-based cryptosystems and signature schemes
- Practical Identity-Based Encryption Without Random Oracles
- Title not available (Why is that?)
- Title not available (Why is that?)
- Malleable proof systems and applications
- Advances in Cryptology - CRYPTO 2003
- Topics in Cryptology – CT-RSA 2004
- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding
- Constructive cryptography -- a new paradigm for security definitions and proofs
- A Formal Treatment of Onion Routing
- Rerandomizable RCCA Encryption
- Theory of Cryptography
- Message transmission with reverse firewalls -- secure communication on corrupted machines
- Cryptographic reverse firewalls
- Revisiting (R)CCA security and replay protection
- Structure-preserving and re-randomizable RCCA-secure public key encryption and its applications
- Cryptographic reverse firewall via malleable smooth projective hash functions
- Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts
- Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved
- Improving the efficiency of re-randomizable and replayable CCA secure public key encryption
- SOFSEM 2005: Theory and Practice of Computer Science
Cited In (3)
This page was built for publication: Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6157526)