Verifiable registration-based encryption
From MaRDI portal
Publication:2096501
DOI10.1007/978-3-030-56784-2_21zbMath1504.94142OpenAlexW2982636075MaRDI QIDQ2096501
Rishab Goyal, Satyanarayana Vusirikala
Publication date: 9 November 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56784-2_21
Related Items (7)
Optimizing registration based encryption ⋮ Efficient laconic cryptography from learning with errors ⋮ Registered attribute-based encryption ⋮ Lower bounds for the number of decryption updates in registration-based encryption ⋮ How to use (plain) witness encryption: registered ABE, flexible broadcast, and more ⋮ Laconic private set intersection and applications ⋮ Identity-based encryption with security against the KGC: a formal model and its instantiations
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Probabilistic encryption
- Registration-based encryption: removing private-key generator from IBE
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Identity-based encryption from the Diffie-Hellman assumption
- Laconic oblivious transfer and its applications
- From selective IBE to full IBE and selective HIBE
- New constructions of identity-based and key-dependent message secure encryption schemes
- Registration-based encryption from standard assumptions
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments
- Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits
- Identity-Based Cryptosystems and Signature Schemes
- Functional Encryption: Definitions and Challenges
- Short Pairing-Based Non-interactive Zero-Knowledge Arguments
- Distributed Private-Key Generators for Identity-Based Cryptography
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- Reducing Trust in the PKG in Identity Based Cryptosystems
- Removing Escrow from Identity-Based Encryption
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Fuzzy Identity-Based Encryption
- Separating succinct non-interactive arguments from all falsifiable assumptions
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: Verifiable registration-based encryption