Pages that link to "Item:Q4550285"
From MaRDI portal
The following pages link to An Identity Based Encryption Scheme Based on Quadratic Residues (Q4550285):
Displaying 50 items.
- An efficient IBE scheme with tight security reduction in the random oracle model (Q264126) (← links)
- Comment on ``A strong provably secure IBE scheme without bilinear map'' by M. Zheng, Y. Xiang and H. Zhou (Q269479) (← links)
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem (Q396599) (← links)
- Spatial encryption supporting non-monotone access structure (Q404924) (← links)
- Shorter identity-based encryption via asymmetric pairings (Q404944) (← links)
- An ID-based cryptographic mechanisms based on GDLP and IFP (Q456110) (← links)
- An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem (Q477687) (← links)
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model (Q514535) (← links)
- An identity-based encryption scheme with compact ciphertexts (Q615206) (← links)
- Forward-secure identity-based signature: security notions and construction (Q621647) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Verifiability-based conversion from CPA to CCA-secure predicate encryption (Q683914) (← links)
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups (Q735025) (← links)
- A strong provably secure IBE scheme without bilinear map (Q743115) (← links)
- Fully CCA2 secure identity based broadcast encryption without random oracles (Q987813) (← links)
- Designing a secure e-tender submission protocol (Q1020561) (← links)
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (Q1034629) (← links)
- Efficient subtree-based encryption for fuzzy-entity data sharing (Q1626290) (← links)
- Registration-based encryption: removing private-key generator from IBE (Q1629445) (← links)
- Anonymous IBE, leakage resilience and circular security from new assumptions (Q1648813) (← links)
- Functional encryption for computational hiding in prime order groups via pair encodings (Q1692153) (← links)
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions (Q1747658) (← links)
- Function-private functional encryption in the private-key setting (Q1747663) (← links)
- IRIBE: intrusion-resilient identity-based encryption (Q1750529) (← links)
- Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions (Q1753168) (← links)
- Bonsai trees, or how to delegate a lattice basis (Q1928766) (← links)
- Relations between semantic security and anonymity in identity-based encryption (Q1944921) (← links)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption (Q2010596) (← links)
- Functional encryption for cascade automata (Q2013591) (← links)
- Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption (Q2057139) (← links)
- Efficient fully CCA-secure predicate encryptions from pair encodings (Q2070257) (← links)
- A new identity-based multivariate signature scheme (Q2079899) (← links)
- Verifiable registration-based encryption (Q2096501) (← links)
- Dynamic decentralized functional encryption (Q2096508) (← links)
- Fine-grained secure attribute-based encryption (Q2139633) (← links)
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications (Q2147256) (← links)
- Dynamic collusion bounded functional encryption from identity-based encryption (Q2170069) (← links)
- Forward-secure ID based digital signature scheme with forward-secure private key generator (Q2195298) (← links)
- Certificateless public key encryption with equality test (Q2198229) (← links)
- Certain sequence of arithmetic progressions and a new key sharing method (Q2202903) (← links)
- Security-level switchable attribute-based encryption under the strictly weaker assumption family (Q2212065) (← links)
- Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity (Q2227124) (← links)
- On the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptography (Q2287820) (← links)
- Revocable identity-based encryption with server-aided ciphertext evolution (Q2310741) (← links)
- Beta Weil pairing revisited (Q2313463) (← links)
- A new approach to practical function-private inner product encryption (Q2317860) (← links)
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem (Q2318572) (← links)
- Predicate encryption supporting disjunctions, polynomial equations, and inner products (Q2377068) (← links)
- Identity-based signature scheme based on quadratic residues (Q2385410) (← links)
- On the power of rewinding simulators in functional encryption (Q2407055) (← links)