Relations between semantic security and anonymity in identity-based encryption
From MaRDI portal
Publication:1944921
DOI10.1016/J.IPL.2011.02.002zbMath1260.68136OpenAlexW1995448648WikidataQ123001865 ScholiaQ123001865MaRDI QIDQ1944921
Fabien Laguillaumie, Javier Herranz, Carla Ràfols
Publication date: 28 March 2013
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/10230/42264
Cites Work
- Unnamed Item
- Unnamed Item
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Identity-Based Cryptosystems and Signature Schemes
- Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Bonsai Trees, or How to Delegate a Lattice Basis
- Efficient Lattice (H)IBE in the Standard Model
- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
- Practical Identity-Based Encryption Without Random Oracles
- Conjunctive, Subset, and Range Queries on Encrypted Data
- A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption
- Hierarchical Identity Based Encryption with Polynomially Many Levels
- Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data
- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption
- Hierarchical ID-Based Cryptography
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Identity-Based Encryption from the Weil Pairing
- Anonymity from Asymmetry: New Constructions for Anonymous HIBE
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Information Security and Cryptology - ICISC 2005
This page was built for publication: Relations between semantic security and anonymity in identity-based encryption