Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
(Hierarchical) Identity-Based Encryption from Affine Message Authentication - MaRDI portal

(Hierarchical) Identity-Based Encryption from Affine Message Authentication

From MaRDI portal
Publication:2874517

DOI10.1007/978-3-662-44371-2_23zbMath1345.94044OpenAlexW2138805158WikidataQ59163671 ScholiaQ59163671MaRDI QIDQ2874517

Eike Kiltz, Jia-xin Pan, Olivier Blazy

Publication date: 7 August 2014

Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-44371-2_23




Related Items (52)

Master-Key KDM-Secure IBE from PairingsHierarchical Identity-Based Encryption with Tight Multi-challenge SecurityPublic-Key Puncturable Encryption: Modular and Compact ConstructionsAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreSO-CCA secure PKE from pairing based all-but-many lossy trapdoor functionsExtended dual system group and shorter unbounded hierarchical identity based encryptionFine-grained secure attribute-based encryptionAuthenticated key exchange and signatures with tight security in the standard modelNew Proof for BKP IBE Scheme and Improvement in the MIMC SettingSurvey of information securityIBE Under $$k$$-LIN with Shorter Ciphertexts and Private KeysImproved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence ClassesShort signatures from Diffie-Hellman: realizing almost compact public keyTightly CCA-secure identity-based encryption with ciphertext pseudorandomnessDigital Signatures with Memory-Tight Security in the Multi-challenge SettingA generic construction of tightly secure signatures in the multi-user settingCompact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-LinAdaptive Oblivious Transfer and GeneralizationTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionEfficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge SettingDéjà Q All Over Again: Tighter and Broader Reductions of q-Type AssumptionsChopsticks: fork-free two-round multi-signatures from non-interactive assumptionsFine-grained verifier NIZK and its applicationsTight lower bounds and optimal constructions of anonymous broadcast encryption and authenticationIdentity-based encryption in DDH hard groupsTrapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hidingEfficient authentication from hard learning problemsIdentity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext settingUnbounded HIBE with tight securitySecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based EncryptionTighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge SettingTightly secure ring signatures in the standard modelNew chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problemCompact structure-preserving signatures with almost tight securityTightly Secure IBE Under Constant-Size Master Public KeyEquivalences and Black-Box Separations of Matrix Diffie-Hellman ProblemsMulti-input Inner-Product Functional Encryption from PairingsFine-grained secure attribute-based encryptionBloom filter encryption and applications to efficient forward-secret 0-RTT key exchangeAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographyReconfigurable Cryptography: A Flexible Approach to Long-Term SecurityDéjà Q: Encore! Un Petit IBEAdaptively secure revocable hierarchical IBE from \(k\)-linear assumptionTightly secure hierarchical identity-based encryptionMore Efficient Constructions for Inner-Product EncryptionIBE with tight security against selective opening and chosen-ciphertext attacksShort tightly secure signatures for signing a vector of group elements: a new approachTightly secure signature schemes from the LWE and subset sum assumptionsAdaptive Partitioning0-RTT Key Exchange with Full Forward SecrecyAdaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oraclesShort identity-based signatures with tight security from lattices




This page was built for publication: (Hierarchical) Identity-Based Encryption from Affine Message Authentication