Pages that link to "Item:Q5756635"
From MaRDI portal
The following pages link to Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) (Q5756635):
Displaying 50 items.
- An efficient IBE scheme with tight security reduction in the random oracle model (Q264126) (← links)
- Innovative approaches for security of small artefacts (Q465672) (← links)
- Anonymous spatial encryption under affine space delegation functionality with full security (Q506150) (← links)
- Generic construction of designated tester public-key encryption with keyword search (Q713419) (← links)
- Signatures in hierarchical certificateless cryptography: efficient constructions and provable security (Q726365) (← links)
- Revocable hierarchical identity-based encryption via history-free approach (Q906383) (← links)
- Proxy re-encryption with keyword search (Q985079) (← links)
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions (Q1021236) (← links)
- Anonymous IBE, leakage resilience and circular security from new assumptions (Q1648813) (← links)
- Revocable hierarchical identity-based encryption with shorter private keys and update keys (Q1671645) (← links)
- Dual trapdoor identity-based encryption with keyword search (Q1701741) (← links)
- Identity-based encryption with outsourced equality test in cloud computing (Q1750514) (← links)
- IRIBE: intrusion-resilient identity-based encryption (Q1750529) (← links)
- Robust encryption (Q1753165) (← links)
- Policy controlled system with anonymity (Q1786597) (← links)
- Bonsai trees, or how to delegate a lattice basis (Q1928766) (← links)
- Relations between semantic security and anonymity in identity-based encryption (Q1944921) (← links)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption (Q2010596) (← links)
- Revocable hierarchical identity-based encryption (Q2015131) (← links)
- Identity-based encryption with security against the KGC: a formal model and its instantiations (Q2062134) (← links)
- Access control encryption with efficient verifiable sanitized decryption (Q2200529) (← links)
- Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more (Q2215969) (← links)
- Efficient identity-based encryption with hierarchical key-insulation from HIBE (Q2232128) (← links)
- Doubly spatial encryption from DBDH (Q2250446) (← links)
- Anonymous HIBE with short ciphertexts: full security in prime order groups (Q2256104) (← links)
- Predicate encryption supporting disjunctions, polynomial equations, and inner products (Q2377068) (← links)
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness (Q2413008) (← links)
- Inner-product encryption under standard assumptions (Q2430410) (← links)
- Improved hidden vector encryption with short ciphertexts and tokens (Q2430414) (← links)
- Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles (Q2798778) (← links)
- Content-Based Encryption (Q2817803) (← links)
- Linear Encryption with Keyword Search (Q2817812) (← links)
- Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions (Q2953792) (← links)
- An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures (Q2953846) (← links)
- Public-Key Encryption with Delegated Search (Q3011319) (← links)
- HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES (Q3069744) (← links)
- Anonymous Encryption with Partial-Order Subset Delegation Functionality (Q3092355) (← links)
- Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting (Q3104695) (← links)
- Semi-adaptive Security and Bundling Functionalities Made Generic and Easy (Q3181033) (← links)
- Towards Forward Security Properties for PEKS and IBE (Q3194593) (← links)
- Robust Encryption (Q3408211) (← links)
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures (Q3506405) (← links)
- An Identity-Based Key Agreement Protocol for the Network Layer (Q3540060) (← links)
- Practical Identity-Based Encryption Without Random Oracles (Q3593111) (← links)
- Hidden-Vector Encryption with Groups of Prime Order (Q3600494) (← links)
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities (Q3600515) (← links)
- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts (Q3617523) (← links)
- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption (Q3623033) (← links)
- (Q4638057) (← links)
- Robust Encryption, Revisited (Q4916019) (← links)