IBE with tight security against selective opening and chosen-ciphertext attacks
From MaRDI portal
Publication:780378
Recommendations
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Encryption schemes secure against chosen-ciphertext selective opening attacks
- Identity-based encryption tightly secure under chosen-ciphertext attacks
- Constructions secure against receiver selective opening and chosen ciphertext attacks
- Identity-based encryption secure against selective opening attack
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Advances in Cryptology - EUROCRYPT 2004
- On the selective opening security of practical public-key encryption schemes
- A generic construction from selective-IBE to public-key encryption with non-interactive opening
Cites work
- scientific article; zbMATH DE number 4191103 (Why is no real title available?)
- (Hierarchical) identity-based encryption from affine message authentication
- A Framework for Identity-Based Encryption with Almost Tight Security
- All-but-many lossy trapdoor functions
- All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE
- An algebraic framework for Diffie-Hellman assumptions
- Efficient noninteractive proof systems for bilinear groups
- Encryption schemes secure against chosen-ciphertext selective opening attacks
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Identity-based (lossy) trapdoor functions and applications
- Identity-based encryption secure against selective opening attack
- Identity-based encryption tightly secure under chosen-ciphertext attacks
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
- Identity-based lossy encryption from learning with errors
- Identity-based lossy trapdoor functions: new definitions, hierarchical extensions, and implications
- Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security
- On definitions of selective opening security
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Practical Identity-Based Encryption Without Random Oracles
- Public-key encryption with simulation-based selective-opening security and compact ciphertexts
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited
- Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms
- Standard security does not imply indistinguishability under selective opening
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Tightly CCA-secure encryption without pairings
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
- Tightly SIM-SO-CCA secure public key encryption from standard assumptions
- Tightly secure hierarchical identity-based encryption
- Towards tightly secure lattice short signature and id-based encryption
Cited in
(7)- Public Key Cryptography - PKC 2006
- Tightly Secure IBE Under Constant-Size Master Public Key
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- Identity-based encryption secure against selective opening attack
- Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes
- Receiver selective opening security for identity-based encryption in the multi-challenge setting
This page was built for publication: IBE with tight security against selective opening and chosen-ciphertext attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q780378)