Pages that link to "Item:Q5307255"
From MaRDI portal
The following pages link to Advances in Cryptology - EUROCRYPT 2004 (Q5307255):
Displaying 34 items.
- Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles (Q387810) (← links)
- Broadcast encryption based non-interactive key distribution in MANETs (Q389369) (← links)
- Attribute-based encryption schemes with constant-size ciphertexts (Q417988) (← links)
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security (Q418306) (← links)
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups (Q445344) (← links)
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle (Q497143) (← links)
- Certificate-based proxy decryption systems with revocability in the standard model (Q497594) (← links)
- Computational friendly attribute-based encryptions with short ciphertext (Q512647) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Verifiability-based conversion from CPA to CCA-secure predicate encryption (Q683914) (← links)
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search (Q690450) (← links)
- Provable secure identity based generalized signcryption scheme (Q708214) (← links)
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption (Q713423) (← links)
- Secure public-key encryption scheme without random oracles (Q942322) (← links)
- A new framework for the design and analysis of identity-based identification schemes (Q955014) (← links)
- Fully CCA2 secure identity based broadcast encryption without random oracles (Q987813) (← links)
- Extensions of access structures and their cryptographic applications (Q989607) (← links)
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (Q1034629) (← links)
- Efficient subtree-based encryption for fuzzy-entity data sharing (Q1626290) (← links)
- Upgrading to functional encryption (Q1629441) (← links)
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system (Q1647557) (← links)
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems (Q1650427) (← links)
- Revocable hierarchical identity-based encryption with shorter private keys and update keys (Q1671645) (← links)
- Shorter quasi-adaptive NIZK proofs for linear subspaces (Q1698397) (← links)
- Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption (Q1711842) (← links)
- A black-box construction of non-malleable encryption from semantically secure encryption (Q1747662) (← links)
- IRIBE: intrusion-resilient identity-based encryption (Q1750529) (← links)
- Robust encryption (Q1753165) (← links)
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system (Q1791671) (← links)
- On the security of functional encryption in the generic group model (Q6095189) (← links)
- Lattice-based programmable hash functions and applications (Q6182001) (← links)
- Traceable policy-based signatures and instantiation from lattices (Q6195214) (← links)
- A new McEliece-type cryptosystem using Gabidulin-Kronecker product codes (Q6204542) (← links)
- Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts (Q6205019) (← links)