Unbounded HIBE and attribute-based encryption
In this work, we present HIBE and ABE schemes which are “unbounded” in the sense that
the public parameters do not impose additional limitations on the functionality of the …
the public parameters do not impose additional limitations on the functionality of the …
Removing escrow from identity-based encryption: New security notions and key management techniques
SSM Chow - International workshop on public key cryptography, 2009 - Springer
Key escrow is inherent in identity-based encryption (IBE). A curious key generation center
(KGC) can simply generate the user's private key to decrypt a ciphertext. However, can a …
(KGC) can simply generate the user's private key to decrypt a ciphertext. However, can a …
Non-interactive key exchange
Non-interactive key exchange (NIKE) is a fundamental but much-overlooked cryptographic
primitive. It appears as a major contribution in the ground-breaking paper of Diffie and …
primitive. It appears as a major contribution in the ground-breaking paper of Diffie and …
Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security
Lossy encryption was originally studied as a means of achieving efficient and composable
oblivious transfer. Bellare, Hofheinz and Yilek showed that lossy encryption is also selective …
oblivious transfer. Bellare, Hofheinz and Yilek showed that lossy encryption is also selective …
Circular and KDM security for identity-based encryption
J Alperin-Sheriff, C Peikert - International Workshop on Public Key …, 2012 - Springer
We initiate the study of security for key-dependent messages (KDM), sometimes also known
as “circular” or “clique” security, in the setting of identity-based encryption (IBE) …
as “circular” or “clique” security, in the setting of identity-based encryption (IBE) …
Short signatures from weaker assumptions
We provide constructions of (m, 1)-programmable hash functions (PHFs) for m≥ 2.
Mimicking certain programmability properties of random oracles, PHFs can, eg, be plugged …
Mimicking certain programmability properties of random oracles, PHFs can, eg, be plugged …
Multi-receiver identity-based key encapsulation with shortened ciphertext
S Chatterjee, P Sarkar - Progress in Cryptology-INDOCRYPT 2006: 7th …, 2006 - Springer
This paper describes two identity based encryption (IBE) protocols in the multi-receiver
setting. The first protocol is secure in the selective-ID model while the second protocol is …
setting. The first protocol is secure in the selective-ID model while the second protocol is …
New privacy-preserving architectures for identity-/attribute-based encryption
SM Chow - 2010 - search.proquest.com
The notion of identity-based encryption (IBE) was proposed as an economical alternative to
public-key infrastructures. IBE is also a useful building block in various cryptographic …
public-key infrastructures. IBE is also a useful building block in various cryptographic …
Ciphertext generating apparatus, cryptographic communication system, and group parameter generating apparatus
K Takashima - US Patent 8,290,146, 2012 - Google Patents
H04L9/3073—Public key, ie encryption algorithm being computationally infeasible to invert
or user's encryption keys not requiring secrecy involving algebraic varieties, eg elliptic or …
or user's encryption keys not requiring secrecy involving algebraic varieties, eg elliptic or …
Efficient adaptively secure IBBE from the SXDH assumption
SC Ramanna, P Sarkar - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
This paper describes the first constructions of identity-based broadcast encryption (IBBE)
using Type-3 pairings, which can be proved secure against adaptive-identity attacks based …
using Type-3 pairings, which can be proved secure against adaptive-identity attacks based …