Unbounded HIBE and attribute-based encryption

A Lewko, B Waters - Annual International Conference on the Theory and …, 2011 - Springer
In this work, we present HIBE and ABE schemes which are “unbounded” in the sense that
the public parameters do not impose additional limitations on the functionality of the …

Removing escrow from identity-based encryption: New security notions and key management techniques

SSM Chow - International workshop on public key cryptography, 2009 - Springer
Key escrow is inherent in identity-based encryption (IBE). A curious key generation center
(KGC) can simply generate the user's private key to decrypt a ciphertext. However, can a …

Non-interactive key exchange

ESV Freire, D Hofheinz, E Kiltz, KG Paterson - Public-Key Cryptography …, 2013 - Springer
Non-interactive key exchange (NIKE) is a fundamental but much-overlooked cryptographic
primitive. It appears as a major contribution in the ground-breaking paper of Diffie and …

Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security

B Hemenway, B Libert, R Ostrovsky… - Advances in Cryptology …, 2011 - Springer
Lossy encryption was originally studied as a means of achieving efficient and composable
oblivious transfer. Bellare, Hofheinz and Yilek showed that lossy encryption is also selective …

Circular and KDM security for identity-based encryption

J Alperin-Sheriff, C Peikert - International Workshop on Public Key …, 2012 - Springer
We initiate the study of security for key-dependent messages (KDM), sometimes also known
as “circular” or “clique” security, in the setting of identity-based encryption (IBE) …

Short signatures from weaker assumptions

D Hofheinz, T Jager, E Kiltz - … 2011: 17th International Conference on the …, 2011 - Springer
We provide constructions of (m, 1)-programmable hash functions (PHFs) for m≥ 2.
Mimicking certain programmability properties of random oracles, PHFs can, eg, be plugged …

Multi-receiver identity-based key encapsulation with shortened ciphertext

S Chatterjee, P Sarkar - Progress in Cryptology-INDOCRYPT 2006: 7th …, 2006 - Springer
This paper describes two identity based encryption (IBE) protocols in the multi-receiver
setting. The first protocol is secure in the selective-ID model while the second protocol is …

New privacy-preserving architectures for identity-/attribute-based encryption

SM Chow - 2010 - search.proquest.com
The notion of identity-based encryption (IBE) was proposed as an economical alternative to
public-key infrastructures. IBE is also a useful building block in various cryptographic …

Ciphertext generating apparatus, cryptographic communication system, and group parameter generating apparatus

K Takashima - US Patent 8,290,146, 2012 - Google Patents
H04L9/3073—Public key, ie encryption algorithm being computationally infeasible to invert
or user's encryption keys not requiring secrecy involving algebraic varieties, eg elliptic or …

Efficient adaptively secure IBBE from the SXDH assumption

SC Ramanna, P Sarkar - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
This paper describes the first constructions of identity-based broadcast encryption (IBBE)
using Type-3 pairings, which can be proved secure against adaptive-identity attacks based …