Efficient identity-based encryption with hierarchical key-insulation from HIBE
From MaRDI portal
Publication:2232128
DOI10.1007/s10623-021-00926-zzbMath1482.94048OpenAlexW3196437208WikidataQ122166051 ScholiaQ122166051MaRDI QIDQ2232128
Atsushi Takayasu, Keita Emura, Yodai Watanabe
Publication date: 4 October 2021
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-021-00926-z
generic constructionshierarchical identity-based encryptionhierarchical key-insulated identity-based encryption
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An algebraic framework for Diffie-Hellman assumptions
- CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Revocable hierarchical identity-based encryption with shorter private keys and update keys
- Identity-based encryption from the Diffie-Hellman assumption
- From selective IBE to full IBE and selective HIBE
- ABE with tag made easy. Concise framework and new instantiations in prime-order groups
- Bonsai trees, or how to delegate a lattice basis
- Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption
- Identity-based broadcast encryption with efficient revocation
- Efficient revocable identity-based encryption via subset difference methods
- Identity-based encryption with hierarchical key-insulation in the standard model
- Wildcarded identity-based encryption
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
- Extended dual system group and shorter unbounded hierarchical identity based encryption
- A forward-secure public-key encryption scheme
- Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts
- Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
- Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- Efficient (Anonymous) Compact HIBE from Standard Assumptions
- New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters
- Achieving Leakage Resilience through Dual System Encryption
- Identity-Based Encryption Secure against Selective Opening Attack
- Unbounded HIBE and Attribute-Based Encryption
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Efficient Lattice (H)IBE in the Standard Model
- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
- Hierarchical ID-Based Cryptography
- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
- Revocable Identity-Based Encryption Revisited: Security Model and Construction
- Generic Constructions of Revocable Identity-Based Encryption
- Hierarchical Identity-Based Encryption with Tight Multi-challenge Security
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Fuzzy Identity-Based Encryption
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
- Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Tightly secure hierarchical identity-based encryption
- Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
This page was built for publication: Efficient identity-based encryption with hierarchical key-insulation from HIBE