Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
B Waters - International workshop on public key cryptography, 2011 - Springer
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE)
under concrete and noninteractive cryptographic assumptions in the standard model. Our …
under concrete and noninteractive cryptographic assumptions in the standard model. Our …
Registered attribute-based encryption
Attribute-based encryption (ABE) generalizes public-key encryption and enables fine-
grained control to encrypted data. However, ABE upends the traditional trust model of public …
grained control to encrypted data. However, ABE upends the traditional trust model of public …
NTRUSIGN: Digital signatures using the NTRU lattice
In this paper we introduce NTRUSign, an ew family of signature schemes based on solving
the approximate closest vector problem (appr-CVP) in NTRU-type lattices. We explore the …
the approximate closest vector problem (appr-CVP) in NTRU-type lattices. We explore the …
Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services
Digital identities and profiles are precious assets. On one hand they enable users to engage
in transactions and interactions on the Internet. On the other hand, abuses and leakages of …
in transactions and interactions on the Internet. On the other hand, abuses and leakages of …
Identity based authenticated key agreement protocols from pairings
L Chen, C Kudla - 16th IEEE Computer Security Foundations …, 2003 - ieeexplore.ieee.org
We investigate a number of issues related to identity based authenticated key agreement
protocols in the Diffie-Hellman family enabled by the Weil or Tate pairings. These issues …
protocols in the Diffie-Hellman family enabled by the Weil or Tate pairings. These issues …
Efficient registration-based encryption
Registration-based encryption (RBE) was recently introduced as an alternative to identity-
based encryption (IBE), to resolve the key-escrow problem: In RBE, the trusted authority is …
based encryption (IBE), to resolve the key-escrow problem: In RBE, the trusted authority is …
Certificateless public-key signature: security model and efficient construction
Z Zhang, DS Wong, J Xu, D Feng - … , ACNS 2006, Singapore, June 6-9 …, 2006 - Springer
Abstract “Certificateless public-key cryptosystem” is a new and attractive paradigm, which
avoids the inherent key escrow property in identity-based public-key cryptosystems, and …
avoids the inherent key escrow property in identity-based public-key cryptosystems, and …
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
In this paper, we construct an efficient “multi-receiver identity-based encryption scheme”. Our
scheme only needs one (or none if precomputed and provided as a public parameter) …
scheme only needs one (or none if precomputed and provided as a public parameter) …
Registration-based encryption: removing private-key generator from IBE
In this work, we introduce the notion of registration-based encryption (RBE for short) with the
goal of removing the trust parties need to place in the private-key generator in an IBE …
goal of removing the trust parties need to place in the private-key generator in an IBE …
[PDF][PDF] Secure key issuing in ID-based cryptography
ID-based cryptosystems have many advantages over PKI based cryptosystems in key
distribution, but they also have an inherent drawback of key escrow problem, ie users' …
distribution, but they also have an inherent drawback of key escrow problem, ie users' …