Hierarchical ID-Based Cryptography

From MaRDI portal
Publication:4412820

DOI10.1007/3-540-36178-2_34zbMath1065.94547OpenAlexW2145255308MaRDI QIDQ4412820

Craig Gentry, Alice Silverberg

Publication date: 16 July 2003

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-36178-2_34



Related Items

Unique-path identity based encryption with applications to strongly secure messaging, Forward-secure encryption with fast forwarding, You can sign but not decrypt: hierarchical integrated encryption and signature, On secure ratcheting with immediate decryption, Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding, A survey on functional encryption, Spatial encryption revisited: from delegatable multiple inner product encryption and more, Fork-resilient continuous group key agreement, A lattice-based forward secure IBE scheme for Internet of things, Hierarchical and non-monotonic key-policy attribute-based encryption and its application, Fine-grained secure attribute-based encryption, Generic constructions of integrated PKE and PEKS, An efficient IBE scheme with tight security reduction in the random oracle model, Self-updatable encryption with short public parameters and its extensions, Generic Constructions of Revocable Identity-Based Encryption, Hierarchical Identity-Based Encryption with Tight Multi-challenge Security, Efficient subtree-based encryption for fuzzy-entity data sharing, HIBE: Hierarchical Identity-Based Encryption, Extended dual system group and shorter unbounded hierarchical identity based encryption, Fine-grained secure attribute-based encryption, Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles, Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption, Fine-grained forward secrecy: allow-list/deny-list encryption and applications, How to construct secure proxy cryptosystem, Simpler constructions of asymmetric primitives from obfuscation, Generic constructions for fully secure revocable attribute-based encryption, Efficient revocable identity-based encryption via subset difference methods, A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes, Revocable hierarchical identity-based encryption with shorter private keys and update keys, Reducing elliptic curve logarithms to logarithms in a finite field, Bonsai trees, or how to delegate a lattice basis, Identity-based encryption with hierarchical key-insulation in the standard model, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, A generic construction of tightly secure signatures in the multi-user setting, Forward-secure identity-based signature: security notions and construction, Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks, Formal Security Treatments for Signatures from Identity-Based Encryption, Efficient proxy signcryption scheme with provable CCA and CMA security, Forward-secure ID based digital signature scheme with forward-secure private key generator, Wildcarded identity-based encryption, Relations between semantic security and anonymity in identity-based encryption, Dual trapdoor identity-based encryption with keyword search, Unbounded HIBE with tight security, Provably secure role-based encryption with revocation mechanism, Updatable public key encryption in the standard model, Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme, Tight security for the generic construction of identity-based signature (in the multi-instance setting), Creation of identity-based digital signature schemes from bilinear maps, Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups, General Certificateless Encryption and Timed-Release Encryption, Proxy Re-signatures in the Standard Model, Efficient selective identity-based encryption without random oracles, Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, Compact Hierarchical IBE from Lattices in the Standard Model, Trapdoor delegation and HIBE from middle-product LWE in standard model, Efficient identity-based encryption with hierarchical key-insulation from HIBE, Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources, One forward-secure signature scheme using bilinear maps and its applications, Security analysis of an identity-based strongly unforgeable signature scheme, Self-updatable encryption: time constrained access control with hidden attributes and better efficiency, Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model, New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem, Indifferentiable deterministic hashing to elliptic and hyperelliptic curves, Attribute-Based Encryption with Fast Decryption, Anonymous HIBE with short ciphertexts: full security in prime order groups, Fully secure functional encryption with a large class of relations from the decisional linear assumption, Revocable hierarchical identity-based encryption, Efficient hybrid encryption from ID-based encryption, Compact Group Signatures Without Random Oracles, Practical Identity-Based Encryption Without Random Oracles, Generic construction of designated tester public-key encryption with keyword search, Multi-Identity Single-Key Decryption without Random Oracles, Generalized Identity Based and Broadcast Encryption Schemes, Identity-Based Online/Offline Encryption, Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures, Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange, Policy controlled system with anonymity, Signatures in hierarchical certificateless cryptography: efficient constructions and provable security, An identity-based strongly unforgeable signature without random oracles from bilinear pairings, Attribute-based key-insulated signature and its applications, Multi-key Hierarchical Identity-Based Signatures, Secure administration of cryptographic role-based access control for large-scale cloud storage systems, CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption, Revocable hierarchical identity-based encryption with adaptive security, Adaptive-ID Secure Revocable Identity-Based Encryption, Tightly secure hierarchical identity-based encryption, Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions, On the Theoretical Gap between Group Signatures with and without Unlinkability, Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems, Identity Based Group Signatures from Hierarchical Identity-Based Encryption, Forward-Secure Group Signatures from Pairings, A fully distributed hierarchical attribute-based encryption scheme, Security proofs for identity-based identification and signature schemes, Wildcarded identity-based encryption from lattices, Functional encryption for set intersection in the multi-client setting, Efficient fully CCA-secure predicate encryptions from pair encodings, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting, Direct chosen-ciphertext secure identity-based key encapsulation without random oracles, New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment, Black-box constructions of signature schemes in the bounded leakage setting, Secure Hierarchical Identity Based Encryption Scheme in the Standard Model, Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps, Several security schemes constructed using ECC-based self-certified public key cryptosystems, Forward-secure multisignature and blind signature schemes, Digital Signatures, A provably secure proxy signcryption scheme using bilinear pairings, Compact hierarchical identity-based encryption based on a harder decisional problem, Unnamed Item, Privacy-preserving encryption scheme using DNA parentage test, Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles, Short identity-based signatures with tight security from lattices