Efficient selective identity-based encryption without random oracles

From MaRDI portal
Publication:656924

DOI10.1007/s00145-010-9078-6zbMath1251.94022OpenAlexW2138018104WikidataQ121321312 ScholiaQ121321312MaRDI QIDQ656924

Dan Boneh, Xavier Boyen

Publication date: 13 January 2012

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://eprints.qut.edu.au/69165/1/Boyen_accepted_draft.pdf




Related Items (27)

Constant-Round Maliciously Secure Two-Party Computation in the RAM ModelConstructions of CCA-Secure Revocable Identity-Based EncryptionAttribute-based proxy re-encryption from standard latticesRevocable hierarchical identity-based encryption with shorter private keys and update keysOn the power of rewinding simulators in functional encryptionShort signatures from Diffie-Hellman: realizing almost compact public keyEfficient RKA-Secure KEM and IBE Schemes Against Invertible FunctionsExtended Explicit Relations Between Trace, Definition Field, and Embedding DegreeBounded-collusion decentralized ABE with sublinear parametersHow to Generate and Use Universal SamplersOptimal generic attack against basic Boneh-Boyen signaturesCertificateless encryption scheme with provable security in the standard model suitable for mobile devicesLinear-map vector commitments and their practical applicationsHierarchical and non-monotonic key-policy attribute-based encryption and its applicationAdaptively secure inner product encryption from LWEUnbounded HIBE with tight securityNew technique for chosen-ciphertext security based on non-interactive zero-knowledgeRevocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and moreSelf-updatable encryption: time constrained access control with hidden attributes and better efficiencyAnonymous HIBE with short ciphertexts: full security in prime order groupsConstant-round maliciously secure two-party computation in the RAM modelSimple and generic constructions of succinct functional encryptionAggregatable distributed key generationTuring Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded FunctionsGeneric negation of pair encodingsFully Secure Functional Encryption for Inner Products, from Standard AssumptionsCombined schemes for signature and encryption: the public-key and the identity-based setting



Cites Work


This page was built for publication: Efficient selective identity-based encryption without random oracles