New Anonymity Notions for Identity-Based Encryption
From MaRDI portal
Publication:5902046
DOI10.1007/978-3-642-02002-5_8zbMath1242.68102OpenAlexW1786145820WikidataQ56921118 ScholiaQ56921118MaRDI QIDQ5902046
David Pointcheval, Malika Izabachène
Publication date: 9 June 2009
Published in: Formal to Practical Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-02002-5_8
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication
- Probabilistic encryption
- Generic constructions of identity-based and certificateless kEMs
- Identity-Based Cryptosystems and Signature Schemes
- Practical Identity-Based Encryption Without Random Oracles
- Conjunctive, Subset, and Range Queries on Encrypted Data
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Public Key Cryptography - PKC 2005
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
This page was built for publication: New Anonymity Notions for Identity-Based Encryption