Partitioning via non-linear polynomial functions: more compact IBEs from ideal lattices and bilinear maps
S Katsumata, S Yamada - … 2016: 22nd International Conference on the …, 2016 - Springer
In this paper, we present new adaptively secure identity-based encryption (IBE) schemes.
One of the distinguishing properties of the schemes is that it achieves shorter public …
One of the distinguishing properties of the schemes is that it achieves shorter public …
Adaptively secure identity-based encryption from lattices with asymptotically shorter public parameters
S Yamada - Annual International Conference on the Theory and …, 2016 - Springer
In this paper, we present two new adaptively secure identity-based encryption (IBE)
schemes from lattices. The size of the public parameters, ciphertexts, and private keys are ̃ O …
schemes from lattices. The size of the public parameters, ciphertexts, and private keys are ̃ O …
Server-aided revocable identity-based encryption from lattices
Server-aided revocable identity-based encryption (SR-IBE), recently proposed by Qin et al.
at ESORICS 2015, offers significant advantages over previous user revocation mechanisms …
at ESORICS 2015, offers significant advantages over previous user revocation mechanisms …
Outsider-anonymous broadcast encryption with keyword search: generic construction, CCA security, and with sublinear ciphertexts
K Emura, K Kajita, G Ohtake - IEICE Transactions on Fundamentals …, 2024 - jstage.jst.go.jp
Public key encryption with keyword search (PEKS)[1] is a searchable encryption in a public
key setting. Let assume that a content and related keywords are encrypted and the …
key setting. Let assume that a content and related keywords are encrypted and the …
Quantum‐resistant anonymous identity‐based encryption with trable identities
Abstract Identity‐based encryption (IBE), introduced by Shamir, eliminates the need for
public‐key infrastructure. The sender can simply encrypt a message by using the recipient's …
public‐key infrastructure. The sender can simply encrypt a message by using the recipient's …
More efficient adaptively secure lattice-based IBE with equality test in the standard model
K Asano, K Emura, A Takayasu - IEICE Transactions on …, 2024 - search.ieice.org
Identity-based encryption with equality test (IBEET) is a variant of identity-based encryption
(IBE), in which any user with trapdoors can check whether two ciphertexts are encryption of …
(IBE), in which any user with trapdoors can check whether two ciphertexts are encryption of …
Post-Quantum Secure Identity-Based Matchmaking Encryption
H Wang, K Chen, Q Xie, Q Meng - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Matchmaking encryption constructed in the identity-based encryption setting, named identity-
based matchmaking encryption (IB-ME), requires both sender and receiver to specify target …
based matchmaking encryption (IB-ME), requires both sender and receiver to specify target …
[PDF][PDF] 格上可撤销的基于身份的适应性安全的加密方案
张彦华, 胡予濮, 江明明, 来齐齐 - 电子与信息学报, 2015 - edit.jeit.ac.cn
用户撤销是基于身份的加密(IBE) 方案在实际应用中所必须解决的问题. Chen 等人在ACISP
2012 上给出了第1 个格上可撤销的基于身份的加密(RIBE) 方案, 但其只能达到选择性安全 …
2012 上给出了第1 个格上可撤销的基于身份的加密(RIBE) 方案, 但其只能达到选择性安全 …
Lattice-based dual receiver encryption and more
Dual receiver encryption (DRE), proposed by Diament et al. at ACM CCS 2004, is a special
extension notion of public-key encryption, which enables two independent receivers to …
extension notion of public-key encryption, which enables two independent receivers to …
Adaptively secure efficient (H) IBE over ideal lattice with short parameters
Y Zhang, Y Liu, Y Guo, S Zheng, L Wang - Entropy, 2020 - mdpi.com
Identity-based encryption (IBE), and its hierarchical extension (HIBE), are interesting
cryptographic primitives that aim at the implicit authentication on the users' public keys by …
cryptographic primitives that aim at the implicit authentication on the users' public keys by …