Pages that link to "Item:Q5385725"
From MaRDI portal
The following pages link to Efficient Identity-Based Encryption Without Random Oracles (Q5385725):
Displaying 50 items.
- An efficient IBE scheme with tight security reduction in the random oracle model (Q264126) (← links)
- Self-updatable encryption with short public parameters and its extensions (Q264135) (← links)
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- Unconditionally anonymous ring and mesh signatures (Q321307) (← links)
- On the security of two identity-based conditional proxy re-encryption schemes (Q338380) (← links)
- Shorter identity-based encryption via asymmetric pairings (Q404944) (← links)
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security (Q418306) (← links)
- Programmable hash functions and their applications (Q434345) (← links)
- Accountable authority key policy attribute-based encryption (Q439851) (← links)
- Optimistic fair exchange in the enhanced chosen-key model (Q476842) (← links)
- Concurrent signature without random oracles (Q476860) (← links)
- An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem (Q477687) (← links)
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle (Q497143) (← links)
- Certificateless threshold signature secure in the standard model (Q497178) (← links)
- Certificate-based proxy decryption systems with revocability in the standard model (Q497594) (← links)
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES (Q499658) (← links)
- Simplified small exponent test for batch verification (Q501674) (← links)
- Practical verifiably encrypted signatures without random oracles (Q506783) (← links)
- Security analysis of an identity-based strongly unforgeable signature scheme (Q508608) (← links)
- Computational friendly attribute-based encryptions with short ciphertext (Q512647) (← links)
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model (Q514535) (← links)
- Security models for certificateless signature schemes revisited (Q527206) (← links)
- Self-generated-certificate public key encryption without pairing and its application (Q545362) (← links)
- Efficient certificateless threshold signatures without random oracles (Q545431) (← links)
- An identity-based encryption scheme with compact ciphertexts (Q615206) (← links)
- Strong key-insulated signature in the standard model (Q615357) (← links)
- Certificateless key-insulated signature without random oracles (Q621463) (← links)
- Forward-secure identity-based signature: security notions and construction (Q621647) (← links)
- Efficient traceable signatures in the standard model (Q631785) (← links)
- Provably secure server-aided verification signatures (Q636553) (← links)
- Identity-based broadcast encryption with shorter transmissions (Q655096) (← links)
- Chosen ciphertext secure fuzzy identity based encryption without ROM (Q655101) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Generic security-amplifying methods of ordinary digital signatures (Q712706) (← links)
- Identity-based trapdoor mercurial commitments and applications (Q719291) (← links)
- Certificate-free \textit{ad hoc} anonymous authentication (Q726164) (← links)
- An identity-based strongly unforgeable signature without random oracles from bilinear pairings (Q726463) (← links)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts (Q726568) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- A strong provably secure IBE scheme without bilinear map (Q743115) (← links)
- Verifiable random functions: relations to identity-based key encapsulation and new constructions (Q744351) (← links)
- An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment (Q780213) (← links)
- Generic construction for tightly-secure signatures from discrete log (Q820557) (← links)
- SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions (Q831176) (← links)
- Certificateless signcryption scheme in the standard model (Q845333) (← links)
- Linearly homomorphic structure-preserving signatures and their applications (Q887427) (← links)
- Breaking an ID-based encryption based on discrete logarithm and factorization problems (Q894450) (← links)
- Revocable hierarchical identity-based encryption via history-free approach (Q906383) (← links)
- Certificate-based verifiably encrypted signatures from pairings (Q924671) (← links)
- Secure public-key encryption scheme without random oracles (Q942322) (← links)