Pages that link to "Item:Q3591437"
From MaRDI portal
The following pages link to Identity-Based Encryption Gone Wild (Q3591437):
Displaying 19 items.
- Programmable hash functions and their applications (Q434345) (← links)
- Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? (Q2018816) (← links)
- Wildcarded identity-based encryption from lattices (Q2067630) (← links)
- Beta Weil pairing revisited (Q2313463) (← links)
- Wildcarded identity-based encryption (Q2429713) (← links)
- Edit Distance Based Encryption and Its Application (Q2817807) (← links)
- Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security (Q2829953) (← links)
- Identity-Based Trace and Revoke Schemes (Q3092358) (← links)
- Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting (Q3104695) (← links)
- Privacy-Aware Attribute-Based Encryption with User Accountability (Q3399216) (← links)
- Attribute-Based Broadcast Encryption Scheme Made Efficient (Q3506391) (← links)
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures (Q3506405) (← links)
- Tracing Malicious Proxies in Proxy Re-encryption (Q3600514) (← links)
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme (Q3627448) (← links)
- IDPM: An Improved Degenerate Pattern Matching Algorithm for Biological Sequences (Q4639924) (← links)
- Improved (Hierarchical) Inner-Product Encryption from Lattices (Q4916012) (← links)
- Formal Language Identity-based Cryptography (Q5025958) (← links)
- Extensions of IBE and Related Primitives (Q5050196) (← links)
- Adequate Elliptic Curves for Computing the Product of n Pairings (Q5267791) (← links)