IBE with tight security against selective opening and chosen-ciphertext attacks
From MaRDI portal
Publication:780378
DOI10.1007/s10623-020-00755-6zbMath1448.94209OpenAlexW3016615036WikidataQ122938113 ScholiaQ122938113MaRDI QIDQ780378
Yamin Liu, Bao Li, Dingding Jia
Publication date: 15 July 2020
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-020-00755-6
identity-based encryptionchosen-ciphertext securityselective opening securitytight security reduction
Related Items (1)
Cites Work
- Unnamed Item
- All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE
- Identity-based encryption tightly secure under chosen-ciphertext attacks
- Tightly SIM-SO-CCA secure public key encryption from standard assumptions
- Identity-based lossy encryption from learning with errors
- Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
- A Framework for Identity-Based Encryption with Almost Tight Security
- Tightly CCA-Secure Encryption Without Pairings
- An Algebraic Framework for Diffie-Hellman Assumptions
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- All-But-Many Lossy Trapdoor Functions
- Identity-Based (Lossy) Trapdoor Functions and Applications
- On Definitions of Selective Opening Security
- Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
- Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
- Towards Tightly Secure Lattice Short Signature and Id-Based Encryption
- Identity-Based Encryption Secure against Selective Opening Attack
- Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
- Standard Security Does Not Imply Indistinguishability Under Selective Opening
- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
- Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Practical Identity-Based Encryption Without Random Oracles
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Efficient Noninteractive Proof Systems for Bilinear Groups
- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
- Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Tightly secure hierarchical identity-based encryption
This page was built for publication: IBE with tight security against selective opening and chosen-ciphertext attacks