Unique-path identity based encryption with applications to strongly secure messaging
From MaRDI portal
Publication:6083653
DOI10.1007/978-3-031-30589-4_1zbMath1528.94077MaRDI QIDQ6083653
Paul Rösler, Christoph Striecks, Daniel Slamanig
Publication date: 8 December 2023
Published in: Advances in Cryptology – EUROCRYPT 2023 (Search for Journal in Brave)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Towards bidirectional ratcheted key exchange
- Optimal channel security against fine-grained state compromise: the safety of messaging
- Identity-based encryption from the Diffie-Hellman assumption
- A modular analysis of the Fujisaki-Okamoto transformation
- From selective IBE to full IBE and selective HIBE
- KEM combiners
- A unified and composable take on ratcheting
- The double ratchet: security notions, proofs, and modularization for the Signal protocol
- Efficient ratcheting: almost-optimal guarantees for secure messaging
- Extended dual system group and shorter unbounded hierarchical identity based encryption
- Determining the core primitive for optimally secure ratcheting
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- Unbounded HIBE with tight security
- Updatable public key encryption in the standard model
- Bounded-Collusion IBE from Key Homomorphism
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- Identity-Based Cryptosystems and Signature Schemes
- Public Key Broadcast Encryption for Stateless Receivers
- Bonsai Trees, or How to Delegate a Lattice Basis
- Efficient Lattice (H)IBE in the Standard Model
- Practical Identity-Based Encryption Without Random Oracles
- Hierarchical ID-Based Cryptography
- Secure integration of asymmetric and symmetric encryption schemes
- 0-RTT Key Exchange with Full Forward Secrecy
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
- Information Security and Cryptology - ICISC 2003
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
This page was built for publication: Unique-path identity based encryption with applications to strongly secure messaging