The following pages link to (Q4434880):
Displayed 50 items.
- An efficient IBE scheme with tight security reduction in the random oracle model (Q264126) (← links)
- Self-updatable encryption with short public parameters and its extensions (Q264135) (← links)
- Tightly secure signatures and public-key encryption (Q300383) (← links)
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem (Q396599) (← links)
- Spatial encryption supporting non-monotone access structure (Q404924) (← links)
- Shorter identity-based encryption via asymmetric pairings (Q404944) (← links)
- Attribute-based encryption schemes with constant-size ciphertexts (Q417988) (← links)
- Provably-secure time-bound hierarchical key assignment schemes (Q431793) (← links)
- One forward-secure signature scheme using bilinear maps and its applications (Q506297) (← links)
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency (Q511917) (← links)
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model (Q514535) (← links)
- Forward-secure identity-based signature: security notions and construction (Q621647) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Signatures in hierarchical certificateless cryptography: efficient constructions and provable security (Q726365) (← links)
- Attribute-based key-insulated signature and its applications (Q726546) (← links)
- Verifiable random functions: relations to identity-based key encapsulation and new constructions (Q744351) (← links)
- Certificateless signcryption scheme in the standard model (Q845333) (← links)
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes (Q895004) (← links)
- Revocable hierarchical identity-based encryption via history-free approach (Q906383) (← links)
- A new framework for the design and analysis of identity-based identification schemes (Q955014) (← links)
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions (Q1021236) (← links)
- Efficient subtree-based encryption for fuzzy-entity data sharing (Q1626290) (← links)
- Certifying trapdoor permutations, revisited (Q1629429) (← links)
- Revocable hierarchical identity-based encryption with shorter private keys and update keys (Q1671645) (← links)
- Functional encryption for computational hiding in prime order groups via pair encodings (Q1692153) (← links)
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem (Q1750339) (← links)
- IRIBE: intrusion-resilient identity-based encryption (Q1750529) (← links)
- Batch verification of short signatures (Q1928768) (← links)
- A cryptographic analysis of the TLS 1.3 handshake protocol (Q1983332) (← links)
- Revocable hierarchical identity-based encryption with adaptive security (Q2043020) (← links)
- Compact designated verifier NIZKs from the CDH assumption without pairings (Q2051369) (← links)
- New constructions of statistical NIZKs: dual-mode DV-NIZKs and more (Q2055662) (← links)
- Non-interactive zero knowledge from sub-exponential DDH (Q2056667) (← links)
- Functional encryption for set intersection in the multi-client setting (Q2068378) (← links)
- Forward secure message franking (Q2104457) (← links)
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications (Q2147256) (← links)
- Forward-secure ID based digital signature scheme with forward-secure private key generator (Q2195298) (← links)
- A formal security analysis of the Signal messaging protocol (Q2210444) (← links)
- KDM security for identity-based encryption: constructions and separations (Q2215124) (← links)
- Trapdoor delegation and HIBE from middle-product LWE in standard model (Q2229268) (← links)
- Fast, compact, and expressive attribute-based encryption (Q2234469) (← links)
- Doubly spatial encryption from DBDH (Q2250446) (← links)
- Anonymous HIBE with short ciphertexts: full security in prime order groups (Q2256104) (← links)
- Efficient hybrid encryption from ID-based encryption (Q2267789) (← links)
- Bandwidth-efficient attribute-based key-insulated signatures with message recovery (Q2282075) (← links)
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem (Q2318572) (← links)
- Computing on authenticated data (Q2344052) (← links)
- Privacy-preserving encryption scheme using DNA parentage test (Q2344762) (← links)
- How to construct secure proxy cryptosystem (Q2384529) (← links)
- Identity-based encryption with hierarchical key-insulation in the standard model (Q2414931) (← links)