Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1842494 - MaRDI portal

scientific article; zbMATH DE number 1842494

From MaRDI portal
Publication:4783728

zbMath1002.94023MaRDI QIDQ4783728

Matthew Franklin, Dan Boneh

Publication date: 8 December 2002

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2139/21390213

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Generic Constructions of Revocable Identity-Based Encryption, Verifiable Inner Product Encryption Scheme, Hierarchical Identity-Based Encryption with Tight Multi-challenge Security, Public-Key Puncturable Encryption: Modular and Compact Constructions, Almost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and More, A property-based attestation protocol for TCM, A more efficient accountable authority IBE scheme under the DL assumption, CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles, A strongly secure identity-based authenticated group key exchange protocol, A new ID-based proxy multi-signature scheme from bilinear pairings, Pairing-Based Cryptography, Boneh-Franklin IBE, Boneh-Boyen IBE, HIBE: Hierarchical Identity-Based Encryption, Short Integrated PKE+PEKS in Standard Model, New Proof for BKP IBE Scheme and Improvement in the MIMC Setting, Efficient Certificate-Based Signature and Its Aggregation, Elliptic divisibility sequences over the Edwards model of elliptic curves, Public key encryption with distributed keyword search, Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority, Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves, Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem, Reducing elliptic curve logarithms to logarithms in a finite field, Attribute-Based Broadcast Encryption Scheme Made Efficient, A Brief History of Provably-Secure Public-Key Encryption, Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures, Cryptanalytic Flaws in Oh et al.’s ID-Based Authenticated Key Agreement Protocol, One-Round Attribute-Based Key Exchange in the Multi-Party Setting, Identity-Based Batch Provable Data Possession with Detailed Analyses, Ciphertext-policy attribute-based encryption for general circuits from bilinear maps, Efficient Certificate-Based Encryption in the Standard Model, Certificate-Based Signature Schemes without Pairings or Random Oracles, Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, Blind Identity-Based Encryption and Simulatable Oblivious Transfer, ON BOUNDS FOR BALANCED EMBEDDING DEGREE, Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security, Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems, Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources, Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority, Indifferentiable deterministic hashing to elliptic and hyperelliptic curves, Functional Encryption: Origins and Recent Developments, Decentralized Attribute-Based Signatures, Attribute-Based Encryption with Fast Decryption, Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies, New Constructions and Applications of Trapdoor DDH Groups, Identity-based authenticated key agreement protocol based on Weil pairing, A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract), The Function Field Sieve in the Medium Prime Case, Practical Identity-Based Encryption Without Random Oracles, ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message, Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility, An Efficient ID-Based Proxy Signature Scheme from Pairings, Multi-Identity Single-Key Decryption without Random Oracles, Universally Composable Adaptive Oblivious Transfer, Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption, Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems, Pairings in Trusted Computing, One-Round ID-Based Blind Signature Scheme without ROS Assumption, Tracing Malicious Proxies in Proxy Re-encryption, Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities, Revisiting Pairing Based Group Key Exchange, Identity-Based Online/Offline Encryption, Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures, Proxy Signatures Secure Against Proxy Key Exposure, Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption, Optimised Versions of the Ate and Twisted Ate Pairings, Constructing Pairing-Friendly Elliptic Curves Using Gröbner Basis Reduction, Multi-key Hierarchical Identity-Based Signatures, Verifier-Key-Flexible Universal Designated-Verifier Signatures, Threshold Privacy Preserving Keyword Searches, Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks, Functional Encryption for Cascade Automata (Extended Abstract), A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power, Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles, Efficient ID-Based Digital Signatures with Message Recovery, Strongly Secure Certificateless Public Key Encryption Without Pairing, The Twin Diffie-Hellman Problem and Applications, Identity-Based Threshold Key-Insulated Encryption without Random Oracles, CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption, Multi-identity management for identity-based cryptography, An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations, Key-Private Proxy Re-encryption, Secure and Efficient Group Key Agreements for Cluster Based Networks, Salvaging Merkle-Damgård for Practical Applications, Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme, Verifiable Random Functions from Identity-Based Key Encapsulation, What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?, Building Key-Private Public-Key Encryption Schemes, Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography, On Indifferentiable Hashing into the Jacobian of Hyperelliptic Curves of Genus 2, An efficient certificateless multi-receiver threshold decryption scheme, Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption, Cluster-Based Energy-Efficient Secure Routing in Wireless Sensor Networks, Unnamed Item, AN IDENTITY-BASED ENCRYPTION SCHEME USING ISOGENY OF ELLIPTIC CURVES, Unnamed Item, A conference key distribution system, Adequate Elliptic Curves for Computing the Product of n Pairings, Formal Language Identity-based Cryptography, Lattice-Based SNARGs and Their Application to More Efficient Obfuscation, Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups, Bounded Collusion ABE for TMs from IBE, Multi-input non-interactive functional encryption: constructions and applications, Efficient laconic cryptography from learning with errors, Fully adaptive decentralized multi-authority \textsf{ABE}, Registered attribute-based encryption, PFLM: privacy-preserving federated learning with membership proof, An efficient identity-based signature scheme with provable security, Individual discrete logarithm with sublattice reduction, Fast subgroup membership testings for \(\mathbb{G}_1, \mathbb{G}_2\) and \(\mathbb{G}_T\) on pairing-friendly curves, A practical compiler for attribute-based encryption: new decentralized constructions and more, Unique-path identity based encryption with applications to strongly secure messaging, Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded, (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin, Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey, Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications, Identity-based encryption in DDH hard groups, On Constructing Pairing-Free Identity-Based Encryptions, Anonymous yet Traceable Strong Designated Verifier Signature, Optimal generic attack against basic Boneh-Boyen signatures, IBE with incompressible master secret and small identity secrets, On the impossibility of algebraic vector commitments in pairing-free groups, Homomorphic encryption: a mathematical survey, Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance, Full quantum equivalence of group action DLog and CDH, and more, \textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves. Faster indifferentiable hashing to elliptic curves, Multi-client functional encryption with fine-grained access control, Identity-based matchmaking encryption from standard assumptions, Fast hashing to \(\mathbb{G}_2\) on pairing-friendly curves with the lack of twists, Generic constructions of master-key KDM secure attribute-based encryption, A novel lightweight decentralized attribute-based signature scheme for social co-governance, Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE, How to build a trapdoor function from an encryption scheme, Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption, A Generic Construction of Integrated Secure-Channel Free PEKS and PKE, Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding, An Efficient and Provably Secure Private Polynomial Evaluation Scheme, A survey on functional encryption, Lower bounds for the number of decryption updates in registration-based encryption, How to sample a discrete Gaussian (and more) from a random oracle, More efficient verifiable functional encryption, Simplified server-aided revocable identity-based encryption from lattices, Generic construction of trace-and-revoke inner product functional encryption, Lattice-based programmable hash functions and applications, Security-preserving distributed samplers: how to generate any CRS in one round without random oracles, Complementary set encryption for privacy-preserving data consolidation, Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks, Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting, Searchable encryption with randomized ciphertext and randomized keyword search, A new authentication scheme based on chaotic maps and factoring problems, A lattice-based forward secure IBE scheme for Internet of things, Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts, A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography, CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions, Access Control Encryption for Equality, Comparison, and More, Constraining Pseudorandom Functions Privately, Tightly Secure IBE Under Constant-Size Master Public Key, On Removing Graded Encodings from Functional Encryption, Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions, Fine-grained secure attribute-based encryption, Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange, Tighter security proofs for GPV-IBE in the quantum random oracle model, Oblivious signature-based envelope, Match me if you can: matchmaking encryption and its applications, Tightly secure hierarchical identity-based encryption, Minicrypt primitives with algebraic structure and applications, New Anonymity Notions for Identity-Based Encryption, New Anonymity Notions for Identity-Based Encryption, Escrow-free encryption supporting cryptographic workflow, Chosen-Ciphertext Secure Proxy Re-encryption without Pairings, On the Security of Online/Offline Signatures and Multisignatures from ACISP’06, Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups, Secure Hierarchical Identity Based Encryption Scheme in the Standard Model, A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low, Type-Based Proxy Re-encryption and Its Construction, Another Approach to Pairing Computation in Edwards Coordinates, The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version, CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution, An efficient IBE scheme with tight security reduction in the random oracle model, Self-updatable encryption with short public parameters and its extensions, Faster Ate pairing computation on Selmer's model of elliptic curves, Structure-preserving signatures and commitments to group elements, Generalized closest substring encryption, Further refinements of Miller's algorithm on Edwards curves, Twin-Beth: security under active and concurrent attacks for the Beth identity-based identification scheme, Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode, Efficient hardware implementation of finite fields with applications to cryptography, A comparison of MNT curves and supersingular curves, Zero-knowledge proofs of retrievability, ID-based authenticated group key agreement from bilinear maps, Full and partial deniability for authentication schemes, Simulatability and security of certificateless threshold signatures, Cryptanalysis of tripartite and multi-party authenticated key agreement protocols, The generalized Weil pairing and the discrete logarithm problem on elliptic curves, An ID-based authenticated dynamic group key agreement with optimal round, A provable secure fuzzy identity based signature scheme, Chosen ciphertext secure authenticated group communication using identity-based signcryption, An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices, An identity-based encryption scheme with compact ciphertexts, An improved ring signature scheme without trusted key generation center for wireless sensor network, Implementing optimized pairings with elliptic nets, Breaking an ID-based encryption based on discrete logarithm and factorization problems, One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity, Provably secure identity-based authenticated key agreement protocols with malicious private key generators, Forward-secure identity-based signature: security notions and construction, Identity-based threshold decryption on access structure, Fully secure revocable attribute-based encryption, Identity-based key-insulated proxy signature without random oracles, Efficient proxy signcryption scheme with provable CCA and CMA security, Identity-based chameleon hashing and signatures without key exposure, A round-optimal three-party ID-based authenticated key agreement protocol, Conditional e-payments with transferability, Group-oriented setting's multisigncryption scheme with threshold designcryption, Programmable hash functions and their applications, One-round identity-based key exchange with perfect forward security, Reducing equational theories for the decision of static equivalence, An efficient dynamic authenticated key exchange protocol with selectable identities, Zero-knowledge identification scheme based on Weil pairing, Accountable authority key policy attribute-based encryption, Improved Pollard rho method for computing discrete logarithms over finite extension fields, Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups, Authentication protocol using an identifier in an ad hoc network environment, Short undeniable signatures based on group homomorphisms, Efficient certificateless proxy signature scheme with provable security, Identity-based partially blind signature in the standard model for electronic cash, Certificate-based verifiably encrypted signatures from pairings, An efficient identity based generalized signcryption scheme, Identity-based broadcast encryption with shorter transmissions, Chosen ciphertext secure fuzzy identity based encryption without ROM, Analysis and improvement of authenticatable ring signcryption scheme, Efficient selective identity-based encryption without random oracles, An efficient key-policy attribute-based encryption scheme with constant ciphertext length, Optimistic fair exchange in the enhanced chosen-key model, Efficient algorithms for secure outsourcing of bilinear pairings, An ID-based signcryption scheme with compartmented secret sharing for unsigncryption, An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem, Eta pairing computation on general divisors over hyperelliptic curves \(y^2=x^p - x+d\), Private key agreement and secure communication for heterogeneous sensor networks, Strongly secure authenticated key exchange from factoring, codes, and lattices, Non-interactive identity-based threshold signature scheme without random oracles, Certificateless threshold signature secure in the standard model, Certificate-based proxy decryption systems with revocability in the standard model, Fixed argument pairing inversion on elliptic curves, Algebraic (trapdoor) one-way functions: constructions and applications, Improved elliptic curve hashing and point representation, Strongly full-hiding inner product encryption, Self-updatable encryption: time constrained access control with hidden attributes and better efficiency, Computational friendly attribute-based encryptions with short ciphertext, An algebraic framework for Diffie-Hellman assumptions, Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model, Efficient Tate pairing computation using double-base chains, Verifiability-based conversion from CPA to CCA-secure predicate encryption, An efficient ring signature scheme from pairings, Key updating technique in identity-based encryption, A pairing-based publicly verifiable secret sharing scheme, Designated verifier proxy signature scheme without random oracles, Fully collusion-resistant traitor tracing scheme with shorter ciphertexts, An ID-based multi-signer universal designated multi-verifier signature scheme, Provable secure identity based generalized signcryption scheme, Generic construction of designated tester public-key encryption with keyword search, Proxy re-encryption with keyword search, Fully CCA2 secure identity based broadcast encryption without random oracles, Identity-based trapdoor mercurial commitments and applications, Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05, An identity-based strongly unforgeable signature without random oracles from bilinear pairings, Attribute-based key-insulated signature and its applications, An enhanced \((t,n)\) threshold directed signature scheme, Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts, On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups, A strong provably secure IBE scheme without bilinear map, Verifiable random functions: relations to identity-based key encapsulation and new constructions, Improvement of an outsourced attribute-based encryption scheme, An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment, Complete addition formulas on the level four theta model of elliptic curves, Black-box constructions of signature schemes in the bounded leakage setting, Uniform encodings to elliptic curves and indistinguishable point representation, ``The simplest protocol for oblivious transfer revisited, Combined schemes for signature and encryption: the public-key and the identity-based setting, Pairing-based cryptography on elliptic curves, Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields, Efficient subtree-based encryption for fuzzy-entity data sharing, Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time, Impossibility of simulation secure functional encryption even with random oracles, Registration-based encryption: removing private-key generator from IBE, Fine-grained secure attribute-based encryption, Efficient hash maps to \(\mathbb{G}_2\) on BLS curves, Attribute-based access control for inner product functional encryption from LWE, LOVE a pairing, Revocable policy-based chameleon hash, Fine-grained forward secrecy: allow-list/deny-list encryption and applications, Versatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract), Server-aided revocable attribute-based encryption revised: multi-user setting and fully secure, Optimizing registration based encryption, Cross-domain attribute-based access control encryption, Identity based linkable ring signature with logarithmic size, Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience, Public-key quantum digital signature scheme with one-time pad private-key, Message authentication mechanism and privacy protection in the context of vehicular ad hoc networks, Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions, Revocable hierarchical identity-based encryption with shorter private keys and update keys, Batch verification of short signatures, Provably secure and efficient certificateless authenticated tripartite key agreement protocol, KCI-resilient anonymous wireless link-layer authentication protocols, Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications, Timed-release computational secret sharing and threshold encryption, Functional encryption for computational hiding in prime order groups via pair encodings, E-passport EAC scheme based on identity-based cryptography, Solving discrete logarithms on a 170-bit MNT curve by pairing reduction, Provably secure certificate-based encryption with leakage resilience, Cryptanalysis of an identity based broadcast encryption scheme without random oracles, Faster pairing computation on genus \(2\) hyperelliptic curves, Dual trapdoor identity-based encryption with keyword search, Efficient identity-based threshold decryption scheme from bilinear pairings, Parallelizing pairings on Hessian elliptic curves, Injective encodings to binary ordinary elliptic curves, Fine-grained searchable encryption in multi-user setting, Choosing and generating parameters for pairing implementation on BN curves, Computing discrete logarithms in \(\mathbb F_{p^6}\), A provable authenticated group key agreement protocol for mobile environment, New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem, Identity-based encryption with outsourced equality test in cloud computing, A refinement of Müller's cube root algorithm, Robust encryption, Flexible attribute-based proxy re-encryption for efficient data sharing, Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation, Universal designated verifier signature scheme with non-delegatability in the standard model, Efficient attribute-based encryption with attribute revocation for assured data deletion, Efficient identity-based authenticated key agreement protocol from pairings, New identity-based society oriented signature schemes from pairings on elliptic curves, Updating key size estimations for pairings, Fully secure functional encryption with a large class of relations from the decisional linear assumption, Functional encryption for cascade automata, Revocable hierarchical identity-based encryption, Formulae for arithmetic on genus 2 hyperelliptic curves, Supersingular hyperelliptic curves of genus 2 over finite fields, Efficient algorithms for Koblitz curves over fields of characteristic three, Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?, Indiscreet logarithms in finite fields of small characteristic, A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges, Policy controlled system with anonymity, Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis, Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs, Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption, Pairings for cryptographers, Short fail-stop signature scheme based on factorization and discrete logarithm assumptions, Revocable hierarchical identity-based encryption with adaptive security, Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity, Breaking the short certificateless signature scheme, An improved identity-based key agreement protocol and its security proof, A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model, Compact NIZKs from standard assumptions on bilinear maps, Non-interactive zero knowledge from sub-exponential DDH, Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification, Generic construction of server-aided revocable hierarchical identity-based encryption, Distributed key generation for SM9-based systems, Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption, Designing a secure e-tender submission protocol, Master-key KDM-secure ABE via predicate encoding, Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance, Identity-based encryption with security against the KGC: a formal model and its instantiations, Security proofs for identity-based identification and signature schemes, Using abelian varieties to improve pairing-based cryptography, Identity-based authenticated encryption with identity confidentiality, Wildcarded identity-based encryption from lattices, Functional encryption for set intersection in the multi-client setting, Efficient fully CCA-secure predicate encryptions from pair encodings, Direct chosen-ciphertext secure identity-based key encapsulation without random oracles, A self-pairing map and its applications to cryptography, The twin Diffie-Hellman problem and applications, A secure and scalable group key exchange system, A new identity-based multivariate signature scheme, Hardware implementation of multiplication over quartic extension fields, Verifiable registration-based encryption, Dynamic decentralized functional encryption, Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields, A secure cross-chain transaction model based on quantum multi-signature, Revocable hierarchical identity-based authenticated key exchange, Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles, Extended dual system group and shorter unbounded hierarchical identity based encryption, On the near prime-order MNT curves, Further refinement of pairing computation based on Miller's algorithm, Multi-use and unidirectional identity-based proxy re-encryption schemes, Certificateless signature: a new security model and an improved generic construction, ID-based cryptography using symmetric primitives, How to construct secure proxy cryptosystem, Pirate decoder for the broadcast encryption schemes from Crypto 2005, Identity-based signature scheme based on quadratic residues, A pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumption, Public key encryption with temporary and fuzzy keyword search, Faster beta Weil pairing on BLS pairing friendly curves with odd embedding degree, A survey on delegated computation, An efficient signcryption for data access control in cloud computing, Accountable identity-based encryption with distributed private key generators, Generic constructions for fully secure revocable attribute-based encryption, Anonymous single-sign-on for \(n\) designated services with traceability, Efficient revocable identity-based encryption with short public parameters, Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases, Dynamic collusion bounded functional encryption from identity-based encryption, Efficient revocable identity-based encryption via subset difference methods, A query privacy-enhanced and secure search scheme over encrypted data in cloud computing, Key regeneration-free ciphertext-policy attribute-based encryption and its application, On the power of rewinding simulators in functional encryption, Lattice trapdoors and IBE from middle-product LWE, Predicate encryption from bilinear maps and one-sided probabilistic rank, Efficient traceable ring signature scheme without pairings, Short signatures from Diffie-Hellman: realizing almost compact public key, Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness, Algebraic generalization of Diffie-Hellman key exchange, Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation, Automated analysis of cryptographic assumptions in generic group models, Anonymous certificate-based broadcast encryption with constant decryption cost, Privacy-enhanced attribute-based private information retrieval, A novel scheme of anonymous authentication on trust in pervasive social networking, Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction, Certificateless public key encryption with equality test, Inner-product encryption under standard assumptions, Improved hidden vector encryption with short ciphertexts and tokens, Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters, Provably secure role-based encryption with revocation mechanism, Tightly CCA-secure encryption scheme in a multi-user setting with corruptions, Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme, Tight security for the generic construction of identity-based signature (in the multi-instance setting), An efficient threshold key-insulated signature scheme, Chosen ciphertext secure identity-based broadcast encryption in the standard model, Security-level switchable attribute-based encryption under the strictly weaker assumption family, New technique for chosen-ciphertext security based on non-interactive zero-knowledge, (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance, Public key encryption with equality test from generic assumptions in the random oracle model, The relation and transformation between hierarchical inner product encryption and spatial encryption, Secure identity-based signcryption in the standard model, On hardware and software implementation of arithmetic in finite fields of characteristic 7 for calculation of pairings, Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity, Secure and efficient delegation of elliptic-curve pairing, Public key encryption with filtered equality test revisited, Efficient identity-based encryption with hierarchical key-insulation from HIBE, All-in-one group-oriented cryptosystem based on bilinear pairing, New \((t, n)\) threshold directed signature scheme with provable security, Anonymous HIBE with short ciphertexts: full security in prime order groups, Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings, A taxonomy of pairing-friendly elliptic curves, Efficient hybrid encryption from ID-based encryption, Simulatable certificateless two-party authenticated key agreement protocol, Continuous leakage-resilient certificate-based encryption, Strongly secure identity-based authenticated key agreement protocols without bilinear pairings, Escrow free attribute-based signature with self-revealability, Bandwidth-efficient attribute-based key-insulated signatures with message recovery, A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model, Novel updatable identity-based hash proof system and its applications, A survey of some recent bit-parallel \(\mathrm{GF}(2^n)\) multipliers, Weakness of \(\mathbb{F}_{3^{6 \cdot 1429}}\) and \(\mathbb{F}_{2^{4 \cdot 3041}}\) for discrete logarithm cryptography, On the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptography, The geometry of some parameterizations and encodings, Identity-based encryption with leakage-amplified chosen-ciphertext attacks security, A multi-authority approach to various predicate encryption types, Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing, Secure independent-update concise-expression access control for video on demand in cloud, Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms, Semi-generic construction of public key encryption and identity-based encryption with equality test, An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks, Revocable identity-based encryption with server-aided ciphertext evolution, A fully distributed hierarchical attribute-based encryption scheme, A generic framework for accountable optimistic fair exchange protocol, Beta Weil pairing revisited, Koblitz curves over quadratic fields, Ephemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environments, Lattice-based revocable certificateless signature, Identity based designated multi-confirmer signature: a new type signature, Fail-stop blind signature scheme design based on pairings, Identity based group-oriented undeniable signature scheme, Still wrong use of pairings in cryptography, Identity oriented signature scheme based on quadratic residues, Several security schemes constructed using ECC-based self-certified public key cryptosystems, A new deniable authentication protocol from bilinear pairings, Efficient algorithms for speeding up the computations of elliptic curve cryptosystems, Time-and-ID-based proxy reencryption scheme, A provably secure proxy signcryption scheme using bilinear pairings, Sequential aggregate signatures with short public keys without random oracles, New cube root algorithm based on the third order linear recurrence relations in finite fields, Unnamed Item, Efficient three-party authenticated key agreement protocol in certificateless cryptography, Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves, Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More, Identity based group key agreement in multiple PKG environment, Signcryption-based key management for MANETs applications in mobile commerce, Idetity based group key agreement from bilinear pairing, Semi-adaptive Security and Bundling Functionalities Made Generic and Easy, Single-Key to Multi-Key Functional Encryption with Polynomial Loss, An Efficient and Provably Secure Certificate-Based Encryption Scheme, A relation between embedding degrees and class numbers of binary quadratic forms, Constructions of CCA-Secure Revocable Identity-Based Encryption, Scalable revocable identity-based signature over lattices in the standard model, Privacy-preserving distributed deep learning based on secret sharing, Privacy-enhanced remote data integrity checking with updatable timestamp, Blockchain-based system for secure outsourcing of bilinear pairings, Subgroup Security in Pairing-Based Cryptography, On Near Prime-Order Elliptic Curves with Small Embedding Degrees, Key-Policy Multi-authority Attribute-Based Encryption, Forward-secure revocable identity-based encryption, Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings, Adaptive Oblivious Transfer and Generalization, Towards Tightly Secure Lattice Short Signature and Id-Based Encryption, Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting, Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps, How to Generate and Use Universal Samplers, Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction, NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion, An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures, Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update, Efficient Dynamic Provable Data Possession from Dynamic Binary Tree, Identity-Based Batch Provable Data Possession, One-Round Attribute-Based Key Exchange in the Multi-party Setting, Two Notes on the Security of Certificateless Signatures, Formal Security Treatments for Signatures from Identity-Based Encryption, Traceable Identity-Based Group Signature, An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model, Unbounded dynamic predicate compositions in ABE from standard assumptions, Inner-product functional encryption with fine-grained access control, A new certificateless multiple key agreement scheme, CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors, Cryptographic group actions and applications, Decentralized multi-client functional encryption for set intersection with improved efficiency, Receiver selective opening security for identity-based encryption in the multi-challenge setting, Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH, Multi-party functional encryption, Ring-based identity based encryption -- asymptotically shorter MPK and tighter security, On the impossibility of purely algebraic signatures, Direct computation of branching programs and its applications to more efficient lattice-based cryptography, New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters, Achieving IND-CCA Security for Functional Encryption for Inner Products, On Constructing Parameterized Families of Pairing-Friendly Elliptic Curves with $$\rho =1$$, Unnamed Item, Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups, Compact Inner Product Encryption from LWE, SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption, Simplified Revocable Hierarchical Identity-Based Encryption from Lattices, Generic Construction of Bounded-Collusion IBE via Table-Based ID-to-Key Map, Public-Key Encryption with Delegated Search, Hashing into Hessian Curves, Algebraic Partitioning: Fully Compact and (almost) Tightly Secure Cryptography, Reconfigurable Cryptography: A Flexible Approach to Long-Term Security, Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups, Secure Data Aggregation in Wireless Sensor Networks: Homomorphism versus Watermarking Approach, Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits, Leakage-Resilient Functional Encryption via Pair Encodings, Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance, One-Round Strong Oblivious Signature-Based Envelope, Identity-Based Group Encryption, Edit Distance Based Encryption and Its Application, Proxy Re-encryption with Delegatable Verifiability, Linear Encryption with Keyword Search, Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security, Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information, Deterministic Encoding into Twisted Edwards Curves, EMBEDDING FINITE FIELDS INTO ELLIPTIC CURVES, A Lattice-Based Group Signature Scheme with Message-Dependent Opening, Efficient Identity-Based Signcryption in the Standard Model, Generating Pairing-Friendly Curves with the CM Equation of Degree 1, Identity Based Group Signatures from Hierarchical Identity-Based Encryption, Conjunctive Broadcast and Attribute-Based Encryption, Attribute-Based Encryption for Range Attributes, Cryptographic Pairings Based on Elliptic Nets, Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes, Towards Security Notions for White-Box Cryptography, Attribute-based re-encryption scheme in the standard model, A new certificateless public key encryption scheme, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting, Parallelizing the Weil and Tate Pairings, Publicly Verifiable Secret Sharing for Cloud-Based Key Management, On Constructing Families of Pairing-Friendly Elliptic Curves with Variable Discriminant, A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme, Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs, New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, Robust Encryption, Efficient system parameters for Identity-Based Encryption using supersingular elliptic curves, Computing fixed argument pairings with the elliptic net algorithm, Heuristic counting of Kachisa-Schaefer-Scott curves, On Dynamic Distribution of Private Keys over MANETs, Establishment of Ad-Hoc Communities through Policy-Based Cryptography