Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
From MaRDI portal
Publication:3600515
DOI10.1007/978-3-540-85538-5_23zbMath1186.94465OpenAlexW1601348745MaRDI QIDQ3600515
Kenneth G. Paterson, Sriramkrishnan Srinivasan
Publication date: 10 February 2009
Published in: Pairing-Based Cryptography – Pairing 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-85538-5_23
Related Items (5)
Registration-based encryption: removing private-key generator from IBE ⋮ Simulation-based selective opening security for receivers under chosen-ciphertext attacks ⋮ Registered attribute-based encryption ⋮ Building Key-Private Public-Key Encryption Schemes ⋮ Verifiable registration-based encryption
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Identity-Based Cryptosystems and Signature Schemes
- Practical Identity-Based Encryption Without Random Oracles
- Multi-authority Attribute Based Encryption
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Secure integration of asymmetric and symmetric encryption schemes
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
- Cryptography and Coding
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
This page was built for publication: Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities