Adaptively secure efficient (H) IBE over ideal lattice with short parameters

Y Zhang, Y Liu, Y Guo, S Zheng, L Wang - Entropy, 2020 - mdpi.com
Identity-based encryption (IBE), and its hierarchical extension (HIBE), are interesting
cryptographic primitives that aim at the implicit authentication on the users' public keys by …

Generic CCA Secure Key Homomorphic KEM and Updatable Public Key Encryption

K Chen, A Miyaji, J Chen - International Conference on Information …, 2024 - Springer
Abstract Updatable Public Key Encryption (UPKE) is a technique for updating public and
private keys in secure messaging protocols, which was initially introduced by Jost et …

Adaptively secure hierarchical identity-based encryption over lattice

L Zhang, Q Wu - Network and System Security: 11th International …, 2017 - Springer
Quantum computer is regarded as a threat to the cryptosystem at present. Lattice with a rich
mathematics structure gave a choice for building post-quantum secure hierarchical identity …

Quantum-safe anonymous hierarchical identity-based encryption with traceable identities

NA Van Nguyen, MTT Pham - Computer Standards & Interfaces, 2023 - Elsevier
Abstract Anonymous Identity Based Encryption (AIBET) scheme allows a tracer to use the
tracing key to reveal the recipient's identity from the ciphertext while keeping other data …

Efficient hierarchical identity based encryption scheme in the standard model over lattices

F Wang, C Wang, Z Liu - Frontiers of Information Technology & Electronic …, 2016 - Springer
Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based
hierarchical identity based encryption (HIBE) scheme in the standard model whose public …

Anonymous communication system provides a secure environment without leaking metadata, which has many application scenarios in IoT

NA Van Nguyen, MTT Pham - arXiv preprint arXiv:2111.05523, 2021 - arxiv.org
Anonymous Identity Based Encryption (AIBET) scheme allows a tracer to use the tracing key
to reveal the recipient's identity from the ciphertext while keeping other data anonymous …

[PDF][PDF] Efficient Lattice based (H) IB-DRE

K Singh, CP Rangan, I You, AJ Antony, SK Karthika… - 2022 - jowua.com
In CCS'04, Diament etc al. presented special kind of public key encryption called Dual
Receiver Encryption (DRE). In DRE, sender encrypts the plaintext using public keys of two …

[引用][C] 标准模型下格上固定长度消息签名方案

汪洁洁, 许春根, 徐磊, 张星 - 南京理工大学学报, 2015