Adaptively secure efficient (H) IBE over ideal lattice with short parameters
Y Zhang, Y Liu, Y Guo, S Zheng, L Wang - Entropy, 2020 - mdpi.com
Identity-based encryption (IBE), and its hierarchical extension (HIBE), are interesting
cryptographic primitives that aim at the implicit authentication on the users' public keys by …
cryptographic primitives that aim at the implicit authentication on the users' public keys by …
Generic CCA Secure Key Homomorphic KEM and Updatable Public Key Encryption
Abstract Updatable Public Key Encryption (UPKE) is a technique for updating public and
private keys in secure messaging protocols, which was initially introduced by Jost et …
private keys in secure messaging protocols, which was initially introduced by Jost et …
Adaptively secure hierarchical identity-based encryption over lattice
L Zhang, Q Wu - Network and System Security: 11th International …, 2017 - Springer
Quantum computer is regarded as a threat to the cryptosystem at present. Lattice with a rich
mathematics structure gave a choice for building post-quantum secure hierarchical identity …
mathematics structure gave a choice for building post-quantum secure hierarchical identity …
Quantum-safe anonymous hierarchical identity-based encryption with traceable identities
NA Van Nguyen, MTT Pham - Computer Standards & Interfaces, 2023 - Elsevier
Abstract Anonymous Identity Based Encryption (AIBET) scheme allows a tracer to use the
tracing key to reveal the recipient's identity from the ciphertext while keeping other data …
tracing key to reveal the recipient's identity from the ciphertext while keeping other data …
Efficient hierarchical identity based encryption scheme in the standard model over lattices
F Wang, C Wang, Z Liu - Frontiers of Information Technology & Electronic …, 2016 - Springer
Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based
hierarchical identity based encryption (HIBE) scheme in the standard model whose public …
hierarchical identity based encryption (HIBE) scheme in the standard model whose public …
Anonymous communication system provides a secure environment without leaking metadata, which has many application scenarios in IoT
NA Van Nguyen, MTT Pham - arXiv preprint arXiv:2111.05523, 2021 - arxiv.org
Anonymous Identity Based Encryption (AIBET) scheme allows a tracer to use the tracing key
to reveal the recipient's identity from the ciphertext while keeping other data anonymous …
to reveal the recipient's identity from the ciphertext while keeping other data anonymous …
[PDF][PDF] Efficient Lattice based (H) IB-DRE
In CCS'04, Diament etc al. presented special kind of public key encryption called Dual
Receiver Encryption (DRE). In DRE, sender encrypts the plaintext using public keys of two …
Receiver Encryption (DRE). In DRE, sender encrypts the plaintext using public keys of two …