Partitioning via non-linear polynomial functions: more compact IBEs from ideal lattices and bilinear maps

S Katsumata, S Yamada - … 2016: 22nd International Conference on the …, 2016 - Springer
In this paper, we present new adaptively secure identity-based encryption (IBE) schemes.
One of the distinguishing properties of the schemes is that it achieves shorter public …

Adaptively secure identity-based encryption from lattices with asymptotically shorter public parameters

S Yamada - Annual International Conference on the Theory and …, 2016 - Springer
In this paper, we present two new adaptively secure identity-based encryption (IBE)
schemes from lattices. The size of the public parameters, ciphertexts, and private keys are ̃ O …

Server-aided revocable identity-based encryption from lattices

K Nguyen, H Wang, J Zhang - … , CANS 2016, Milan, Italy, November 14-16 …, 2016 - Springer
Server-aided revocable identity-based encryption (SR-IBE), recently proposed by Qin et al.
at ESORICS 2015, offers significant advantages over previous user revocation mechanisms …

Outsider-anonymous broadcast encryption with keyword search: generic construction, CCA security, and with sublinear ciphertexts

K Emura, K Kajita, G Ohtake - IEICE Transactions on Fundamentals …, 2024 - jstage.jst.go.jp
Public key encryption with keyword search (PEKS)[1] is a searchable encryption in a public
key setting. Let assume that a content and related keywords are encrypted and the …

Quantum‐resistant anonymous identity‐based encryption with trable identities

ZY Liu, YF Tseng, R Tso, M Mambo… - IET Information …, 2022 - Wiley Online Library
Abstract Identity‐based encryption (IBE), introduced by Shamir, eliminates the need for
public‐key infrastructure. The sender can simply encrypt a message by using the recipient's …

More efficient adaptively secure lattice-based IBE with equality test in the standard model

K Asano, K Emura, A Takayasu - IEICE Transactions on …, 2024 - search.ieice.org
Identity-based encryption with equality test (IBEET) is a variant of identity-based encryption
(IBE), in which any user with trapdoors can check whether two ciphertexts are encryption of …

Post-Quantum Secure Identity-Based Matchmaking Encryption

H Wang, K Chen, Q Xie, Q Meng - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Matchmaking encryption constructed in the identity-based encryption setting, named identity-
based matchmaking encryption (IB-ME), requires both sender and receiver to specify target …

[PDF][PDF] 格上可撤销的基于身份的适应性安全的加密方案

张彦华, 胡予濮, 江明明, 来齐齐 - 电子与信息学报, 2015 - edit.jeit.ac.cn
用户撤销是基于身份的加密(IBE) 方案在实际应用中所必须解决的问题. Chen 等人在ACISP
2012 上给出了第1 个格上可撤销的基于身份的加密(RIBE) 方案, 但其只能达到选择性安全 …

Lattice-based dual receiver encryption and more

D Zhang, K Zhang, B Li, X Lu, H Xue, J Li - Australasian Conference on …, 2018 - Springer
Dual receiver encryption (DRE), proposed by Diament et al. at ACM CCS 2004, is a special
extension notion of public-key encryption, which enables two independent receivers to …

Adaptively secure efficient (H) IBE over ideal lattice with short parameters

Y Zhang, Y Liu, Y Guo, S Zheng, L Wang - Entropy, 2020 - mdpi.com
Identity-based encryption (IBE), and its hierarchical extension (HIBE), are interesting
cryptographic primitives that aim at the implicit authentication on the users' public keys by …