CCA-secure identity-based matchmaking encryption from standard assumptions
From MaRDI portal
Publication:6573664
DOI10.1007/978-981-97-0942-7_13zbMATH Open1543.94741MaRDI QIDQ6573664
Publication date: 17 July 2024
standard modelidentity-based encryptionchosen-ciphertext attackidentity-based matchmaking encryption
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Identity-Based Cryptosystems and Quadratic Residuosity
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- Identity-Based Cryptosystems and Signature Schemes
- On the Security of the Winternitz One-Time Signature Scheme
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Efficient Lattice (H)IBE in the Standard Model
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Homomorphic Encryption and Signatures from Vector Decomposition
- Hierarchical Predicate Encryption for Inner-Products
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Shorter IBE and Signatures via Asymmetric Pairings
- Secure integration of asymmetric and symmetric encryption schemes
- Advances in Cryptology - EUROCRYPT 2004
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Match me if you can: matchmaking encryption and its applications
- Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
- Identity-based matchmaking encryption from standard assumptions
- Identity-based matchmaking encryption without random oracles
This page was built for publication: CCA-secure identity-based matchmaking encryption from standard assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6573664)