Registration-based encryption: removing private-key generator from IBE
From MaRDI portal
Publication:1629445
DOI10.1007/978-3-030-03807-6_25zbMath1443.94057OpenAlexW2889003703MaRDI QIDQ1629445
Ahmadreza Rahimi, Mohammad Mahmoody, Mohammad Hajiabadi, Sanjam Garg
Publication date: 11 December 2018
Full work available at URL: https://doi.org/10.1007/978-3-030-03807-6_25
Related Items (12)
Optimizing registration based encryption ⋮ Bounded Collusion ABE for TMs from IBE ⋮ LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search ⋮ Efficient laconic cryptography from learning with errors ⋮ Registered attribute-based encryption ⋮ IBE with incompressible master secret and small identity secrets ⋮ Lower bounds for the number of decryption updates in registration-based encryption ⋮ How to use (plain) witness encryption: registered ABE, flexible broadcast, and more ⋮ Laconic private set intersection and applications ⋮ Identity-based encryption with security against the KGC: a formal model and its instantiations ⋮ New constructions of hinting PRGs, OWFs with encryption, and more ⋮ Verifiable registration-based encryption
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Identity-based encryption from the Diffie-Hellman assumption
- Laconic oblivious transfer and its applications
- New constructions of identity-based and key-dependent message secure encryption schemes
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Identity-Based Cryptosystems and Signature Schemes
- On the Communication Complexity of Secure Function Evaluation with Long Output
- Distributed Private-Key Generators for Identity-Based Cryptography
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- Reducing Trust in the PKG in Identity Based Cryptosystems
- Removing Escrow from Identity-Based Encryption
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Witness encryption and its applications
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: Registration-based encryption: removing private-key generator from IBE