Identity-based encryption tightly secure under chosen-ciphertext attacks
From MaRDI portal
Publication:1710596
DOI10.1007/978-3-030-03329-3_7zbMath1446.94137OpenAlexW2794539407MaRDI QIDQ1710596
Dingding Jia, Dennis Hofheinz, Jia-xin Pan
Publication date: 23 January 2019
Full work available at URL: https://doi.org/10.1007/978-3-030-03329-3_7
Related Items (14)
Hierarchical Identity-Based Encryption with Tight Multi-challenge Security ⋮ SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions ⋮ Signatures of Knowledge for Boolean Circuits Under Standard Assumptions ⋮ Signatures of knowledge for Boolean circuits under standard assumptions ⋮ Almost tight multi-user security under adaptive corruptions \& leakages in the standard model ⋮ Fine-grained verifier NIZK and its applications ⋮ Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication ⋮ Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting ⋮ Unbounded HIBE with tight security ⋮ Tightly secure hierarchical identity-based encryption ⋮ Tightly CCA-secure inner product functional encryption scheme ⋮ Identity-based authenticated encryption with identity confidentiality ⋮ IBE with tight security against selective opening and chosen-ciphertext attacks ⋮ Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
This page was built for publication: Identity-based encryption tightly secure under chosen-ciphertext attacks