Unbounded HIBE with tight security
From MaRDI portal
Publication:2692379
DOI10.1007/978-3-030-64834-3_5OpenAlexW3091449968MaRDI QIDQ2692379
Publication date: 21 March 2023
Full work available at URL: https://doi.org/10.1007/978-3-030-64834-3_5
Related Items (5)
Authenticated key exchange and signatures with tight security in the standard model ⋮ Unique-path identity based encryption with applications to strongly secure messaging ⋮ Chopsticks: fork-free two-round multi-signatures from non-interactive assumptions ⋮ Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting ⋮ Short identity-based signatures with tight security from lattices
Cites Work
- Unnamed Item
- Unnamed Item
- Efficient selective identity-based encryption without random oracles
- Improved (almost) tightly-secure simulation-sound QA-NIZK with applications
- Unbounded ABE via bilinear entropy expansion, revisited
- More efficient (almost) tightly secure structure-preserving signatures
- Kurosawa-Desmedt meets tight security
- Compact structure-preserving signatures with almost tight security
- Identity-based encryption tightly secure under chosen-ciphertext attacks
- On tightly secure non-interactive key exchange
- Practical and tightly-secure digital signatures and authenticated key exchange
- Shorter QA-NIZK and SPS with tighter security
- Highly efficient key exchange protocols with optimal tightness
- Tight leakage-resilient CCA-security from quasi-adaptive hash proof system
- Extended dual system group and shorter unbounded hierarchical identity based encryption
- Extended Nested Dual System Groups, Revisited
- A Framework for Identity-Based Encryption with Almost Tight Security
- Tightly CCA-Secure Encryption Without Pairings
- An Algebraic Framework for Diffie-Hellman Assumptions
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
- Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting
- Identity-Based Cryptosystems and Signature Schemes
- Unbounded HIBE and Attribute-Based Encryption
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Bilinear Entropy Expansion from the Decisional Linear Assumption
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Hierarchical ID-Based Cryptography
- Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
- Master-Key KDM-Secure IBE from Pairings
- Hierarchical Identity-Based Encryption with Tight Multi-challenge Security
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Why Proving HIBE Systems Secure Is Difficult
- Tightly secure inner product functional encryption: multi-input and function-hiding constructions
- Tightly secure hierarchical identity-based encryption
This page was built for publication: Unbounded HIBE with tight security