Pages that link to "Item:Q5385744"
From MaRDI portal
The following pages link to Hierarchical Identity Based Encryption with Constant Size Ciphertext (Q5385744):
Displaying 50 items.
- An efficient IBE scheme with tight security reduction in the random oracle model (Q264126) (← links)
- Self-updatable encryption with short public parameters and its extensions (Q264135) (← links)
- Generalized closest substring encryption (Q300391) (← links)
- On the security of two identity-based conditional proxy re-encryption schemes (Q338380) (← links)
- Attribute-based encryption schemes with constant-size ciphertexts (Q417988) (← links)
- Provably-secure time-bound hierarchical key assignment schemes (Q431793) (← links)
- Provably secure one-round identity-based authenticated asymmetric group key agreement protocol (Q433086) (← links)
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups (Q445344) (← links)
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts (Q456458) (← links)
- Anonymous spatial encryption under affine space delegation functionality with full security (Q506150) (← links)
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency (Q511917) (← links)
- An algebraic framework for Diffie-Hellman assumptions (Q514473) (← links)
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model (Q514535) (← links)
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators (Q621645) (← links)
- Forward-secure identity-based signature: security notions and construction (Q621647) (← links)
- Identity-based broadcast encryption with shorter transmissions (Q655096) (← links)
- Efficient provably-secure hierarchical key assignment schemes (Q719310) (← links)
- Signatures in hierarchical certificateless cryptography: efficient constructions and provable security (Q726365) (← links)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts (Q726568) (← links)
- Verifiable random functions: relations to identity-based key encapsulation and new constructions (Q744351) (← links)
- Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol (Q778404) (← links)
- Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes (Q781862) (← links)
- A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption (Q826248) (← links)
- Efficient dynamic threshold identity-based encryption with constant-size ciphertext (Q897859) (← links)
- Revocable hierarchical identity-based encryption via history-free approach (Q906383) (← links)
- New constructions for provably-secure time-bound hierarchical key assignment schemes (Q954992) (← links)
- Fully CCA2 secure identity based broadcast encryption without random oracles (Q987813) (← links)
- Extensions of access structures and their cryptographic applications (Q989607) (← links)
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions (Q1021236) (← links)
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (Q1034629) (← links)
- Efficient subtree-based encryption for fuzzy-entity data sharing (Q1626290) (← links)
- Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions (Q1671634) (← links)
- Revocable hierarchical identity-based encryption with shorter private keys and update keys (Q1671645) (← links)
- Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost (Q1694723) (← links)
- Dual trapdoor identity-based encryption with keyword search (Q1701741) (← links)
- A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption (Q1708030) (← links)
- STP-LWE: A variant of learning with error for a flexible encryption (Q1718158) (← links)
- Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems (Q1733051) (← links)
- Adaptable key-policy attribute-based encryption with time interval (Q1741937) (← links)
- IRIBE: intrusion-resilient identity-based encryption (Q1750529) (← links)
- Policy controlled system with anonymity (Q1786597) (← links)
- How to build time-lock encryption (Q1791669) (← links)
- Expressive attribute-based keyword search with constant-size ciphertext (Q1800303) (← links)
- Identity-based encryption with equality test and datestamp-based authorization mechanism (Q1998853) (← links)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption (Q2010596) (← links)
- Functional encryption for cascade automata (Q2013591) (← links)
- Revocable hierarchical identity-based encryption (Q2015131) (← links)
- Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption (Q2035455) (← links)
- On subversion-resistant SNARKs (Q2039405) (← links)
- Revocable hierarchical identity-based encryption with adaptive security (Q2043020) (← links)