Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
From MaRDI portal
Publication:1034629
DOI10.1016/J.TCS.2009.08.007zbMath1194.68111OpenAlexW2068136832WikidataQ59163718 ScholiaQ59163718MaRDI QIDQ1034629
Publication date: 6 November 2009
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2009.08.007
Related Items (8)
Constructions of CCA-Secure Revocable Identity-Based Encryption ⋮ Timed-release computational secret sharing and threshold encryption ⋮ Wildcarded identity-based encryption ⋮ Programmable hash functions and their applications ⋮ New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters ⋮ New technique for chosen-ciphertext security based on non-interactive zero-knowledge ⋮ Public key encryption with keyword search secure against keyword guessing attacks without random oracle ⋮ CCA-security from adaptive all-but-one lossy trapdoor functions
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On the construction of pseudorandom permutations: Luby-Rackoff revisited
- On-line/off-line digital signatures
- Generic constructions of identity-based and certificateless kEMs
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- Identity-Based Cryptosystems and Signature Schemes
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles
- Practical Identity-Based Encryption Without Random Oracles
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Hierarchical ID-Based Cryptography
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Probability Inequalities for Sums of Bounded Random Variables
- New Constructions of Constant Size Ciphertext HIBE Without Random Oracle
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Advances in Cryptology - CRYPTO 2003
- Faster Pairings Using an Elliptic Curve with an Efficient Endomorphism
- On the Generic Insecurity of the Full Domain Hash
- Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Selected Areas in Cryptography
- Topics in Cryptology – CT-RSA 2005
- Progress in Cryptology - INDOCRYPT 2004
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Theory of Cryptography
- Public Key Cryptography - PKC 2006
- Information Security and Cryptology - ICISC 2005
- Topics in Cryptology – CT-RSA 2004
This page was built for publication: Direct chosen-ciphertext secure identity-based key encapsulation without random oracles