Constructions of CCA-Secure Revocable Identity-Based Encryption
From MaRDI portal
Publication:3194596
DOI10.1007/978-3-319-19962-7_11zbMath1358.94064OpenAlexW1051540762MaRDI QIDQ3194596
Yuu Ishida, Yodai Watanabe, Junji Shikata
Publication date: 20 October 2015
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-19962-7_11
Related Items (6)
Efficient revocable identity-based encryption with short public parameters ⋮ Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance ⋮ New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters ⋮ Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more ⋮ Identity-based authenticated encryption with identity confidentiality ⋮ Revocable hierarchical identity-based authenticated key exchange
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Efficient selective identity-based encryption without random oracles
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Generic constructions of identity-based and certificateless kEMs
- Revocable Identity-Based Encryption from Lattices
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Practical Identity-Based Encryption Without Random Oracles
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Revocable Identity-Based Encryption Revisited: Security Model and Construction
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Theory of Cryptography
This page was built for publication: Constructions of CCA-Secure Revocable Identity-Based Encryption