Identity-based encryption in DDH hard groups
From MaRDI portal
Publication:6103077
DOI10.1007/978-3-031-17433-9_4zbMath1515.94054OpenAlexW4306399813MaRDI QIDQ6103077
Publication date: 2 June 2023
Published in: Progress in Cryptology - AFRICACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-17433-9_4
Cites Work
- Identity-based encryption from the Diffie-Hellman assumption
- Optimal security proofs for full domain hash. Revisited
- Hash proof systems over lattices revisited
- Offline witness encryption with semi-adaptive security
- Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation
- How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\)
- Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification
- On the impossibility of purely algebraic signatures
- How to Avoid Obfuscation Using Witness PRFs
- Offline Witness Encryption
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Optimal Security Proofs for Full Domain Hash, Revisited
- Tightly-Secure Signatures from Chameleon Hash Functions
- Disjunctions for Hash Proof Systems: New Constructions and Applications
- Identity-Based Cryptosystems and Signature Schemes
- One-Time Signatures and Chameleon Hash Functions
- Trapdoors for hard lattices and new cryptographic constructions
- On the Analysis of Cryptographic Assumptions in the Generic Ring Model
- A public key cryptosystem and a signature scheme based on discrete logarithms
- A monte carlo method for factorization
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Efficient Identity-Based Encryption Without Random Oracles
- Witness encryption and its applications
- On Extractability Obfuscation
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
- Cryptography and Coding
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Identity-based encryption in DDH hard groups