Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization

B Waters - International workshop on public key cryptography, 2011 - Springer
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE)
under concrete and noninteractive cryptographic assumptions in the standard model. Our …

Registered attribute-based encryption

S Hohenberger, G Lu, B Waters, DJ Wu - Annual International Conference …, 2023 - Springer
Attribute-based encryption (ABE) generalizes public-key encryption and enables fine-
grained control to encrypted data. However, ABE upends the traditional trust model of public …

NTRUSIGN: Digital signatures using the NTRU lattice

J Hoffstein, N Howgrave-Graham, J Pipher… - Cryptographers' track at …, 2003 - Springer
In this paper we introduce NTRUSign, an ew family of signature schemes based on solving
the approximate closest vector problem (appr-CVP) in NTRU-type lattices. We explore the …

Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services

MC Mont, S Pearson, P Bramhall - 14th International Workshop …, 2003 - ieeexplore.ieee.org
Digital identities and profiles are precious assets. On one hand they enable users to engage
in transactions and interactions on the Internet. On the other hand, abuses and leakages of …

Identity based authenticated key agreement protocols from pairings

L Chen, C Kudla - 16th IEEE Computer Security Foundations …, 2003 - ieeexplore.ieee.org
We investigate a number of issues related to identity based authenticated key agreement
protocols in the Diffie-Hellman family enabled by the Weil or Tate pairings. These issues …

Efficient registration-based encryption

N Glaeser, D Kolonelos, G Malavolta… - Proceedings of the 2023 …, 2023 - dl.acm.org
Registration-based encryption (RBE) was recently introduced as an alternative to identity-
based encryption (IBE), to resolve the key-escrow problem: In RBE, the trusted authority is …

Certificateless public-key signature: security model and efficient construction

Z Zhang, DS Wong, J Xu, D Feng - … , ACNS 2006, Singapore, June 6-9 …, 2006 - Springer
Abstract “Certificateless public-key cryptosystem” is a new and attractive paradigm, which
avoids the inherent key escrow property in identity-based public-key cryptosystems, and …

Efficient multi-receiver identity-based encryption and its application to broadcast encryption

J Baek, R Safavi-Naini, W Susilo - Public Key Cryptography-PKC 2005: 8th …, 2005 - Springer
In this paper, we construct an efficient “multi-receiver identity-based encryption scheme”. Our
scheme only needs one (or none if precomputed and provided as a public parameter) …

Registration-based encryption: removing private-key generator from IBE

S Garg, M Hajiabadi, M Mahmoody… - Theory of Cryptography …, 2018 - Springer
In this work, we introduce the notion of registration-based encryption (RBE for short) with the
goal of removing the trust parties need to place in the private-key generator in an IBE …

[PDF][PDF] Secure key issuing in ID-based cryptography

B Lee, C Boyd, E Dawson, K Kim, J Yang… - Proceedings of the second …, 2004 - Citeseer
ID-based cryptosystems have many advantages over PKI based cryptosystems in key
distribution, but they also have an inherent drawback of key escrow problem, ie users' …