Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Why Proving HIBE Systems Secure Is Difficult - MaRDI portal

Why Proving HIBE Systems Secure Is Difficult

From MaRDI portal
Publication:5418689

DOI10.1007/978-3-642-55220-5_4zbMath1326.94109OpenAlexW2098199531MaRDI QIDQ5418689

No author found.

Publication date: 27 May 2014

Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_4




Related Items (21)

Hierarchical Identity-Based Encryption with Tight Multi-challenge SecurityParameter-hiding order revealing encryptionQuantum algorithms for the \(k\)-XOR problemTightness subtleties for multi-user PKE notionsOptimal tightness for chain-based unique signaturesAdaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear GroupsSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceMulti-instance secure public-key encryptionAdaptive multiparty NIKEThe power of undirected rewindings for adaptive securityOn optimal tightness for key exchange with full forward secrecy via key confirmationOn the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle modelKey encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightnessUnbounded HIBE with tight securityThe cost of adaptivity in security games on graphsTowards tight adaptive security of non-interactive key exchangeSimple and more efficient PRFs with tight security from LWE and matrix-DDHAnonymous spatial encryption under affine space delegation functionality with full securityTightly secure hierarchical identity-based encryptionVerifiable random functions with optimal tightnessUnnamed Item




This page was built for publication: Why Proving HIBE Systems Secure Is Difficult