Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
From MaRDI portal
Publication:2096618
DOI10.1007/978-3-031-09234-3_21OpenAlexW4285153814MaRDI QIDQ2096618
Tsz Hon Yuen, Sherman S. M. Chow, Cong Zhang
Publication date: 9 November 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-09234-3_21
Cites Work
- New types of cryptanalytic attacks using related keys
- Identity-based encryption tightly secure under chosen-ciphertext attacks
- Non-malleable functions and their applications
- Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices
- Algebraic XOR-RKA-secure pseudorandom functions from post-zeroizing multilinear maps
- Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog
- Identity-Based Encryption Resilient to Continual Auxiliary Leakage
- Continuous Non-malleable Key Derivation and Its Application to Related-Key Security
- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
- Achieving Leakage Resilience through Dual System Encryption
- Correlated-Input Secure Hash Functions
- Cryptography Secure against Related-Key Attacks and Tampering
- Distinguisher and Related-Key Attack on the Full AES-256
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Public-Key Encryption Schemes with Auxiliary Inputs
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- The Uber-Assumption Family
- Removing Escrow from Identity-Based Encryption
- Fast Probabilistic Algorithms for Verification of Polynomial Identities
- RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Practical Dual-Receiver Encryption
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- General Ad Hoc Encryption from Exponent Inversion IBE
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Cryptography and Coding
This page was built for publication: Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE