Identity-based authenticated encryption with identity confidentiality
From MaRDI portal
Publication:2067611
DOI10.1016/j.tcs.2021.11.014OpenAlexW4226022628WikidataQ122042966 ScholiaQ122042966MaRDI QIDQ2067611
Yunlei Zhao, Hong Bing Wang, Shiyu Shen
Publication date: 18 January 2022
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2021.11.014
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
- Pairings for cryptographers
- Zero-knowledge proofs of identity
- An efficient pairing-based shuffle argument
- Identity-based encryption tightly secure under chosen-ciphertext attacks
- Secure integration of asymmetric and symmetric encryption schemes
- Updating key size estimations for pairings
- On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited
- Downgradable identity-based encryption and applications
- On the Security of the TLS Protocol: A Systematic Analysis
- Variants of Waters’ Dual System Primitives Using Asymmetric Pairings
- Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
- Identity-Based Cryptosystems and Signature Schemes
- One-Pass HMQV and Asymmetric Key-Wrapping
- Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
- Constructions of CCA-Secure Revocable Identity-Based Encryption
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Shorter IBE and Signatures via Asymmetric Pairings
- A Brief History of Pairings
- Advances in Cryptology - EUROCRYPT 2004
- Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
- Public Key Cryptography - PKC 2005
- Topics in Cryptology – CT-RSA 2004
- Tightly secure hierarchical identity-based encryption
This page was built for publication: Identity-based authenticated encryption with identity confidentiality