Blazy, Olivier; Germouty, Paul; Phan, Duong Hieu Downgradable identity-based encryption and applications. (English) Zbl 1453.94061 Matsui, Mitsuru (ed.), Topics in cryptology – CT-RSA 2019. The cryptographers’ track at the RSA conference 2019, San Francisco, CA, USA, March 4–8, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11405, 44-61 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{O. Blazy} et al., Lect. Notes Comput. Sci. 11405, 44--61 (2019; Zbl 1453.94061) Full Text: DOI
Duong, Dung Hoang; Le, Huy Quoc; Roy, Partha Sarathi; Susilo, Willy Lattice-based IBE with equality test in standard model. (English) Zbl 1426.94094 Steinfeld, Ron (ed.) et al., Provable security. 13th international conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11821, 19-40 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{D. H. Duong} et al., Lect. Notes Comput. Sci. 11821, 19--40 (2019; Zbl 1426.94094) Full Text: DOI Link
Zhang, Yinghui; Yang, Menglei; Zheng, Dong; Zhang, Tiantian; Guo, Rui; Ren, Fang Leakage-resilient hierarchical identity-based encryption with recipient anonymity. (English) Zbl 1427.68072 Int. J. Found. Comput. Sci. 30, No. 4, 665-681 (2019). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{Y. Zhang} et al., Int. J. Found. Comput. Sci. 30, No. 4, 665--681 (2019; Zbl 1427.68072) Full Text: DOI
Wu, Libing; Zhang, Yubo; Choo, Kim-Kwang Raymond; He, Debiao Pairing-free identity-based encryption with authorized equality test in online social networks. (English) Zbl 1427.68071 Int. J. Found. Comput. Sci. 30, No. 4, 647-664 (2019). MSC: 68P25 91D30 94A60 PDFBibTeX XMLCite \textit{L. Wu} et al., Int. J. Found. Comput. Sci. 30, No. 4, 647--664 (2019; Zbl 1427.68071) Full Text: DOI
Tseng, Yi-Fan; Fan, Chun-I; Sung, Cheng-Wei On the anonymity of multi-receiver identity-based encryption based on Fujisaki-Okamoto transformation. (English) Zbl 1439.94063 Int. J. Found. Comput. Sci. 30, No. 4, 493-509 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{Y.-F. Tseng} et al., Int. J. Found. Comput. Sci. 30, No. 4, 493--509 (2019; Zbl 1439.94063) Full Text: DOI
Zhou, Yanwei; Yang, Bo; Mu, Yi Continuous leakage-resilient identity-based encryption with leakage amplification. (English) Zbl 1419.94055 Des. Codes Cryptography 87, No. 9, 2061-2090 (2019). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Zhou} et al., Des. Codes Cryptography 87, No. 9, 2061--2090 (2019; Zbl 1419.94055) Full Text: DOI
Zhou, Yuyang; Li, Zhaoqi; Hu, Fei; Li, Fagen Identity-based combined public key schemes for signature, encryption, and signcryption. (English) Zbl 1417.94090 Chandra, Peeyush (ed.) et al., Information technology and applied mathematics. ICITAM 2017, Haldia Institute of Technology, Haldia, India, October 30 – November 1, 2017. Singapore: Springer. Adv. Intell. Syst. Comput. 699, 3-22 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Zhou} et al., Adv. Intell. Syst. Comput. 699, 3--22 (2019; Zbl 1417.94090) Full Text: DOI
Huang, Zhengan; Lai, Junzuo; Chen, Wenbin; Au, Man Ho; Peng, Zhen; Li, Jin Simulation-based selective opening security for receivers under chosen-ciphertext attacks. (English) Zbl 1445.94022 Des. Codes Cryptography 87, No. 6, 1345-1371 (2019). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Z. Huang} et al., Des. Codes Cryptography 87, No. 6, 1345--1371 (2019; Zbl 1445.94022) Full Text: DOI
Shikata, Junji; Watanabe, Yohei Identity-based encryption with hierarchical key-insulation in the standard model. (English) Zbl 1455.94192 Des. Codes Cryptography 87, No. 5, 1005-1033 (2019). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{J. Shikata} and \textit{Y. Watanabe}, Des. Codes Cryptography 87, No. 5, 1005--1033 (2019; Zbl 1455.94192) Full Text: DOI
Koshiba, Takeshi; Takashima, Katsuyuki New assumptions on isogenous pairing groups with applications to attribute-based encryption. (English) Zbl 1433.68121 Lee, Kwangsu (ed.), Information security and cryptology – ICISC 2018. 21st international conference, Seoul, South Korea, November 28–30, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11396, 3-19 (2019). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{T. Koshiba} and \textit{K. Takashima}, Lect. Notes Comput. Sci. 11396, 3--19 (2019; Zbl 1433.68121) Full Text: DOI
Wang, Xin; Liang, Bei; Li, Shimin; Xue, Rui On constructing pairing-free identity-based encryptions. (English) Zbl 1517.94161 Chen, Liqun (ed.) et al., Information security. 21st international conference, ISC 2018, Guildford, UK, September 9–12, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11060, 308-327 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Wang} et al., Lect. Notes Comput. Sci. 11060, 308--327 (2018; Zbl 1517.94161) Full Text: DOI
Luo, Fucai; Wang, Kunpeng; Lin, Changlu Leveled hierarchical identity-based fully homomorphic encryption from learning with rounding. (English) Zbl 1515.68119 Su, Chunhua (ed.) et al., Information security practice and experience. 14th international conference, ISPEC 2018, Tokyo, Japan, September 25–27, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11125, 101-115 (2018). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{F. Luo} et al., Lect. Notes Comput. Sci. 11125, 101--115 (2018; Zbl 1515.68119) Full Text: DOI
Ishizaka, Masahito; Matsuura, Kanta Identity-based encryption resilient to auxiliary leakage under the decisional linear assumption. (English) Zbl 1518.94069 Camenisch, Jan (ed.) et al., Cryptology and network security. 17th international conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11124, 417-439 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Ishizaka} and \textit{K. Matsuura}, Lect. Notes Comput. Sci. 11124, 417--439 (2018; Zbl 1518.94069) Full Text: DOI
Liu, Liang; Ye, Jun Identity-based re-encryption scheme with lightweight re-encryption key generation. (English) Zbl 1481.94112 J. Discrete Math. Sci. Cryptography 21, No. 1, 41-57 (2018). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{L. Liu} and \textit{J. Ye}, J. Discrete Math. Sci. Cryptography 21, No. 1, 41--57 (2018; Zbl 1481.94112) Full Text: DOI
Zhang, Rui; Tao, Yang Key dependent message security for revocable identity-based encryption and identity-based encryption. (English) Zbl 1458.94289 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 426-441 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Zhang} and \textit{Y. Tao}, Lect. Notes Comput. Sci. 11149, 426--441 (2018; Zbl 1458.94289) Full Text: DOI
Yun, Kelly; Wang, Xin; Xue, Rui Identity-based functional encryption for quadratic functions from lattices. (English) Zbl 1458.94288 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 409-425 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Yun} et al., Lect. Notes Comput. Sci. 11149, 409--425 (2018; Zbl 1458.94288) Full Text: DOI
Li, Yu; Wang, Yazhe; Zhang, Yuan SecHome: a secure large-scale smart home system using hierarchical identity based encryption. (English) Zbl 1452.94077 Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 339-351 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Li} et al., Lect. Notes Comput. Sci. 10631, 339--351 (2018; Zbl 1452.94077) Full Text: DOI
Zhang, Daode; Fang, Fuyang; Li, Bao; Xue, Haiyang; Liang, Bei Compact hierarchical IBE from lattices in the standard model. (English) Zbl 1452.94095 Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 210-221 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Zhang} et al., Lect. Notes Comput. Sci. 10631, 210--221 (2018; Zbl 1452.94095) Full Text: DOI
Gupta, Kanika; Selvi, S. Sharmila Deva; Rangan, C. Pandu; Dighe, Shubham Sopan Identity-based group encryption revisited. (English) Zbl 1452.94068 Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 205-209 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Gupta} et al., Lect. Notes Comput. Sci. 10631, 205--209 (2018; Zbl 1452.94068) Full Text: DOI
Li, Jiguo; Yu, Qihong; Zhang, Yichen Identity-based broadcast encryption with continuous leakage resilience. (English) Zbl 1436.94080 Inf. Sci. 429, 177-193 (2018). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. Li} et al., Inf. Sci. 429, 177--193 (2018; Zbl 1436.94080) Full Text: DOI
Chang, Donghoon; Chauhan, Amit Kumar; Kumar, Sandeep; Sanadhya, Somitra Kumar Revocable identity-based encryption from codes with rank metric. (English) Zbl 1507.94033 Smart, Nigel P. (ed.), Topics in cryptology – CT-RSA 2018. The cryptographers’ track at the RSA conference 2018, San Francisco, CA, USA, April 16–20, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10808, 435-451 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Chang} et al., Lect. Notes Comput. Sci. 10808, 435--451 (2018; Zbl 1507.94033) Full Text: DOI
Katsumata, Shuichi; Yamada, Shota; Yamakawa, Takashi Tighter security proofs for GPV-IBE in the quantum random oracle model. (English) Zbl 1446.94144 Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 253-282 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Katsumata} et al., Lect. Notes Comput. Sci. 11273, 253--282 (2018; Zbl 1446.94144) Full Text: DOI
Jager, Tibor; Kurek, Rafael Short digital signatures and ID-KEMs via truncation collision resistance. (English) Zbl 1446.94141 Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 221-250 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Jager} and \textit{R. Kurek}, Lect. Notes Comput. Sci. 11273, 221--250 (2018; Zbl 1446.94141) Full Text: DOI
Hofheinz, Dennis; Jia, Dingding; Pan, Jiaxin Identity-based encryption tightly secure under chosen-ciphertext attacks. (English) Zbl 1446.94137 Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 190-220 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Hofheinz} et al., Lect. Notes Comput. Sci. 11273, 190--220 (2018; Zbl 1446.94137) Full Text: DOI
Debris-Alazard, Thomas; Tillich, Jean-Pierre Two attacks on rank metric code-based schemes: RankSign and an IBE scheme. (English) Zbl 1446.94124 Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 62-92 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Debris-Alazard} and \textit{J.-P. Tillich}, Lect. Notes Comput. Sci. 11272, 62--92 (2018; Zbl 1446.94124) Full Text: DOI arXiv Link
Garg, Sanjam; Hajiabadi, Mohammad; Mahmoody, Mohammad; Rahimi, Ahmadreza Registration-based encryption: removing private-key generator from IBE. (English) Zbl 1443.94057 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 689-718 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 11239, 689--718 (2018; Zbl 1443.94057) Full Text: DOI
Paul, Arinjita; Srinivasavaradhan, Varshika; Sharmila Deva Selvi, S.; Pandu Rangan, C. A CCA-secure collusion-resistant identity-based proxy re-encryption scheme. (English) Zbl 1421.94065 Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 111-128 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Paul} et al., Lect. Notes Comput. Sci. 11192, 111--128 (2018; Zbl 1421.94065) Full Text: DOI
Gong, Junqing; Libert, Benoît; Ramanna, Somindu C. Compact IBBE and fuzzy IBE from simple assumptions. (English) Zbl 1517.94103 Catalano, Dario (ed.) et al., Security and cryptography for networks. 11th international conference, SCN 2018, Amalfi, Italy, September 5–7, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11035, 563-582 (2018). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Gong} et al., Lect. Notes Comput. Sci. 11035, 563--582 (2018; Zbl 1517.94103) Full Text: DOI Link
Zhang, Daode; Zhang, Kai; Li, Bao; Lu, Xianhui; Xue, Haiyang; Li, Jie Lattice-based dual receiver encryption and more. (English) Zbl 1444.94114 Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 520-538 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Zhang} et al., Lect. Notes Comput. Sci. 10946, 520--538 (2018; Zbl 1444.94114) Full Text: DOI
Ma, Xuecheng; Wang, Xin; Lin, Dongdai Anonymous identity-based encryption with identity recovery. (English) Zbl 1444.94090 Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 360-375 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Ma} et al., Lect. Notes Comput. Sci. 10946, 360--375 (2018; Zbl 1444.94090) Full Text: DOI arXiv
Hu, Ziyuan; Liu, Shengli; Chen, Kefei; Liu, Joseph K. Revocable identity-based encryption from the computational Diffie-Hellman problem. (English) Zbl 1444.94071 Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 265-283 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Hu} et al., Lect. Notes Comput. Sci. 10946, 265--283 (2018; Zbl 1444.94071) Full Text: DOI
Lee, Kwangsu; Park, Seunghwan Revocable hierarchical identity-based encryption with shorter private keys and update keys. (English) Zbl 1408.94944 Des. Codes Cryptography 86, No. 10, 2407-2440 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Lee} and \textit{S. Park}, Des. Codes Cryptography 86, No. 10, 2407--2440 (2018; Zbl 1408.94944) Full Text: DOI
Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua Public-key quantum digital signature scheme with one-time pad private-key. (English) Zbl 1395.81101 Quantum Inf. Process. 17, No. 1, Paper No. 10, 14 p. (2018). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{F.-L. Chen} et al., Quantum Inf. Process. 17, No. 1, Paper No. 10, 14 p. (2018; Zbl 1395.81101) Full Text: DOI
Guo, Fuchun; Susilo, Willy; Mu, Yi Introduction to security reduction. (English) Zbl 1437.94002 Cham: Springer (ISBN 978-3-319-93048-0/hbk; 978-3-319-93049-7/ebook). xv, 253 p. (2018). Reviewer: Dimitros Poulakis (Thessaloniki) MSC: 94-01 94A60 68P25 PDFBibTeX XMLCite \textit{F. Guo} et al., Introduction to security reduction. Cham: Springer (2018; Zbl 1437.94002) Full Text: DOI
Brakerski, Zvika; Lombardi, Alex; Segev, Gil; Vaikuntanathan, Vinod Anonymous IBE, leakage resilience and circular security from new assumptions. (English) Zbl 1423.94056 Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10820, 535-564 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Brakerski} et al., Lect. Notes Comput. Sci. 10820, 535--564 (2018; Zbl 1423.94056) Full Text: DOI Link
Abdalla, Michel; Bellare, Mihir; Neven, Gregory Robust encryption. (English) Zbl 1444.94035 J. Cryptology 31, No. 2, 307-350 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Abdalla} et al., J. Cryptology 31, No. 2, 307--350 (2018; Zbl 1444.94035) Full Text: DOI
Kitagawa, Fuyuki; Tanaka, Keisuke Key dependent message security and receiver selective opening security for identity-based encryption. (English) Zbl 1385.94050 Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-76577-8/pbk; 978-3-319-76578-5/ebook). Lecture Notes in Computer Science 10769, 32-61 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Kitagawa} and \textit{K. Tanaka}, Lect. Notes Comput. Sci. 10769, 32--61 (2018; Zbl 1385.94050) Full Text: DOI
Han, Shuai; Liu, Shengli; Qin, Baodong; Gu, Dawu Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness. (English) Zbl 1391.68028 Des. Codes Cryptography 86, No. 3, 517-554 (2018). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{S. Han} et al., Des. Codes Cryptography 86, No. 3, 517--554 (2018; Zbl 1391.68028) Full Text: DOI
Watanabe, Yohei; Shikata, Junji Timed-release computational secret sharing and threshold encryption. (English) Zbl 1381.94105 Des. Codes Cryptography 86, No. 1, 17-54 (2018). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{Y. Watanabe} and \textit{J. Shikata}, Des. Codes Cryptography 86, No. 1, 17--54 (2018; Zbl 1381.94105) Full Text: DOI
Luo, Song; Yan, Lu; Weng, Jian; Yang, Zheng New proof for BKP IBE scheme and improvement in the MIMC setting. (English) Zbl 1506.94056 Liu, Joseph K. (ed.) et al., Information security practice and experience. 13th international conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10701, 136-155 (2017). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Luo} et al., Lect. Notes Comput. Sci. 10701, 136--155 (2017; Zbl 1506.94056) Full Text: DOI
He, Kai; Liu, Xueqiao; Yuan, Huaqiang; Wei, Wenhong; Liang, Kaitai Hierarchical conditional proxy re-encryption: a new insight of fine-grained secure data sharing. (English) Zbl 1503.68059 Liu, Joseph K. (ed.) et al., Information security practice and experience. 13th international conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10701, 118-135 (2017). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{K. He} et al., Lect. Notes Comput. Sci. 10701, 118--135 (2017; Zbl 1503.68059) Full Text: DOI
Yamada, Kotoko; Attrapadung, Nuttapong; Emura, Keita; Hanaoka, Goichiro; Tanaka, Keisuke Generic constructions for fully secure revocable attribute-based encryption. (English) Zbl 1522.68092 Foley, Simon N. (ed.) et al., Computer security – ESORICS 2017. 22nd European symposium on research in computer security, Oslo, Norway, September 11–15, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10493, 532-551 (2017). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{K. Yamada} et al., Lect. Notes Comput. Sci. 10493, 532--551 (2017; Zbl 1522.68092) Full Text: DOI
Ishida, Yuu; Shikata, Junji; Watanabe, Yohei CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance. (English) Zbl 1428.94078 Int. J. Appl. Cryptogr. 3, No. 3, 288-311 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Ishida} et al., Int. J. Appl. Cryptogr. 3, No. 3, 288--311 (2017; Zbl 1428.94078) Full Text: DOI
Kurosawa, Kaoru; Phong, Le Trieu IBE and function-private IBE under linear assumptions with shorter ciphertexts and private keys, and extensions. (English) Zbl 1428.94082 Int. J. Appl. Cryptogr. 3, No. 3, 210-224 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{L. T. Phong}, Int. J. Appl. Cryptogr. 3, No. 3, 210--224 (2017; Zbl 1428.94082) Full Text: DOI
Zhang, Daode; Fang, Fuyang; Li, Bao; Wang, Xin Deterministic identity-based encryption from lattices with more compact public parameters. (English) Zbl 1398.94184 Obana, Satoshi (ed.) et al., Advances in information and computer security. 12th international workshop on security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-64199-7/pbk; 978-3-319-64200-0/ebook). Lecture Notes in Computer Science 10418, 215-230 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Zhang} et al., Lect. Notes Comput. Sci. 10418, 215--230 (2017; Zbl 1398.94184) Full Text: DOI
Hu, Xiaoming; Zhang, Xiaojun; Wang, Jian; Xu, Huajie; Tan, Wenan; Yang, Yinchun Secure and efficient identity-based proxy signature scheme in the standard model based on computational Diffie-Hellman problem. (English) Zbl 1391.94761 Arab. J. Sci. Eng. 42, No. 2, 639-649 (2017). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{X. Hu} et al., Arab. J. Sci. Eng. 42, No. 2, 639--649 (2017; Zbl 1391.94761) Full Text: DOI
Li, Mingfu; Chen, Liwei A secure cloud data sharing scheme from identity-based proxy re-encryption. (Chinese. English summary) Zbl 1399.68048 Nat. Sci. J. Xiangtan Univ. 39, No. 3, 75-79 (2017). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{M. Li} and \textit{L. Chen}, Nat. Sci. J. Xiangtan Univ. 39, No. 3, 75--79 (2017; Zbl 1399.68048) Full Text: DOI
McCarthy, Sarah; Smyth, Neil; O’Sullivan, Elizabeth A practical implementation of identity-based encryption over NTRU lattices. (English) Zbl 1397.94089 O’Neill, Máire (ed.), Cryptography and coding. 16th IMA international conference, IMACC 2017, Oxford, UK, December 12–14, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-71044-0/pbk; 978-3-319-71045-7/ebook). Lecture Notes in Computer Science 10655, 227-246 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{S. McCarthy} et al., Lect. Notes Comput. Sci. 10655, 227--246 (2017; Zbl 1397.94089) Full Text: DOI
Liu, Jia’nan; Lai, Junzuo; Huang, Xinyi Dual trapdoor identity-based encryption with keyword search. (English) Zbl 1387.94090 Soft Comput. 21, No. 10, 2599-2607 (2017). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{J. Liu} et al., Soft Comput. 21, No. 10, 2599--2607 (2017; Zbl 1387.94090) Full Text: DOI
Zhou, Fucai; Peng, Su; Xu, Jian; Xu, Zifeng Identity-based batch provable data possession with detailed analyses. (English) Zbl 1417.94089 Int. J. Found. Comput. Sci. 28, No. 6, 743-760 (2017). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{F. Zhou} et al., Int. J. Found. Comput. Sci. 28, No. 6, 743--760 (2017; Zbl 1417.94089) Full Text: DOI
Luo, Peng; Yang, Xiaoyuan Identity-based encryption in multiple PKG environment based on ring signature. (Chinese. English summary) Zbl 1389.68025 J. Shandong Univ., Nat. Sci. 52, No. 6, 64-68 (2017). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{P. Luo} and \textit{X. Yang}, J. Shandong Univ., Nat. Sci. 52, No. 6, 64--68 (2017; Zbl 1389.68025) Full Text: DOI
Wang, Weili; Hu, Bin; Zhao, Xiufeng An efficient multi-identity-based fully homomorphic encryption scheme. (Chinese. English summary) Zbl 1389.68028 J. Shandong Univ., Nat. Sci. 52, No. 5, 85-94 (2017). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{W. Wang} et al., J. Shandong Univ., Nat. Sci. 52, No. 5, 85--94 (2017; Zbl 1389.68028)
Kurosawa, Kaoru; Phong, Le Trieu Anonymous and leakage resilient IBE and IPE. (English) Zbl 1379.68118 Des. Codes Cryptography 85, No. 2, 273-298 (2017). MSC: 68P25 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{L. T. Phong}, Des. Codes Cryptography 85, No. 2, 273--298 (2017; Zbl 1379.68118) Full Text: DOI
Lee, Kwangsu; Lee, Dong Hoon; Park, Jong Hwan Efficient revocable identity-based encryption via subset difference methods. (English) Zbl 1381.94076 Des. Codes Cryptography 85, No. 1, 39-76 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Lee} et al., Des. Codes Cryptography 85, No. 1, 39--76 (2017; Zbl 1381.94076) Full Text: DOI
Xu, Shengmin; Yang, Guomin; Mu, Yi; Susilo, Willy Mergeable and revocable identity-based encryption. (English) Zbl 1386.94089 Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 147-167 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Xu} et al., Lect. Notes Comput. Sci. 10342, 147--167 (2017; Zbl 1386.94089) Full Text: DOI Link
Wei, Jianghong; Liu, Wenfen; Hu, Xuexian Forward-secure identity-based signature with efficient revocation. (English) Zbl 1421.94075 Int. J. Comput. Math. 94, No. 7, 1390-1411 (2017). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Wei} et al., Int. J. Comput. Math. 94, No. 7, 1390--1411 (2017; Zbl 1421.94075) Full Text: DOI
Saraswat, Vishal; Sahu, Rajeev Anand; Awasthi, Amit K. A secure anonymous proxy signcryption scheme. (English) Zbl 1364.94566 J. Math. Cryptol. 11, No. 2, 63-84 (2017). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{V. Saraswat} et al., J. Math. Cryptol. 11, No. 2, 63--84 (2017; Zbl 1364.94566) Full Text: DOI
Hu, Xiaoming; Wang, Jian; Xu, Huajie; Yang, Yinchun; Xu, Xiaolin An improved efficient identity-based proxy signature in the standard model. (English) Zbl 1386.94075 Int. J. Comput. Math. 94, No. 1, 22-38 (2017). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{X. Hu} et al., Int. J. Comput. Math. 94, No. 1, 22--38 (2017; Zbl 1386.94075) Full Text: DOI
Watanabe, Yohei; Emura, Keita; Seo, Jae Hong New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters. (English) Zbl 1383.94049 Handschuh, Helena (ed.), Topics in cryptology – CT-RSA 2017. The cryptographers’ track at the RSA conference 2017, San Francisco, CA, USA, February 14–17, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-52152-7/pbk; 978-3-319-52153-4/ebook). Lecture Notes in Computer Science 10159, 432-449 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Watanabe} et al., Lect. Notes Comput. Sci. 10159, 432--449 (2017; Zbl 1383.94049) Full Text: DOI
Lu, Yang; Li, Jiguo Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model. (English) Zbl 1357.94072 Adv. Math. Commun. 11, No. 1, 161-177 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Lu} and \textit{J. Li}, Adv. Math. Commun. 11, No. 1, 161--177 (2017; Zbl 1357.94072) Full Text: DOI
Golumbeanu, Alin Ionut Application of differential cryptography to a GN authentication hierarchy scheme. (English) Zbl 1364.35453 Electron. J. Differ. Equ. 2017, Paper No. 20, 8 p. (2017). MSC: 35S15 35H20 12H20 11G07 PDFBibTeX XMLCite \textit{A. I. Golumbeanu}, Electron. J. Differ. Equ. 2017, Paper No. 20, 8 p. (2017; Zbl 1364.35453) Full Text: Link
Lee, Hyung Tae; Ling, San; Seo, Jae Hong; Wang, Huaxiong Semi-generic construction of public key encryption and identity-based encryption with equality test. (English) Zbl 1429.68063 Inf. Sci. 373, 419-440 (2016). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{H. T. Lee} et al., Inf. Sci. 373, 419--440 (2016; Zbl 1429.68063) Full Text: DOI Link
Yu, Jia; Hao, Rong; Zhao, Huawei; Shu, Minglei; Fan, Jianxi IRIBE: intrusion-resilient identity-based encryption. (English) Zbl 1390.68284 Inf. Sci. 329, 90-104 (2016). MSC: 68P25 PDFBibTeX XMLCite \textit{J. Yu} et al., Inf. Sci. 329, 90--104 (2016; Zbl 1390.68284) Full Text: DOI
Ma, Sha Identity-based encryption with outsourced equality test in cloud computing. (English) Zbl 1390.68278 Inf. Sci. 328, 389-402 (2016). MSC: 94A60 68P25 68M11 PDFBibTeX XMLCite \textit{S. Ma}, Inf. Sci. 328, 389--402 (2016; Zbl 1390.68278) Full Text: DOI
Chen, Wen; Zhang, Kai; Qian, Haifeng More efficient CCA-secure identity-based dual receiver encryption. (Chinese. English summary) Zbl 1374.68184 J. East China Norm. Univ., Nat. Sci. Ed. 2016, No. 6, 145-156 (2016). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{W. Chen} et al., J. East China Norm. Univ., Nat. Sci. Ed. 2016, No. 6, 145--156 (2016; Zbl 1374.68184) Full Text: DOI
Su, Hang; Liu, Jianwei; Liu, Weiran; Li, Yan Efficient hierarchical identity-based authenticated key agreement protocol. (Chinese. English summary) Zbl 1363.68016 J. Wuhan Univ., Nat. Sci. Ed. 62, No. 3, 249-254 (2016). MSC: 68M12 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{H. Su} et al., J. Wuhan Univ., Nat. Sci. Ed. 62, No. 3, 249--254 (2016; Zbl 1363.68016) Full Text: DOI
Kang, Yuanji; Gu, Chunxiang; Zheng, Yonghui; Guang, Yan Identity-based fully homomorphic encryption from eigenvector. (Chinese. English summary) Zbl 1363.68076 J. Softw. 27, No. 6, 1487-1497 (2016). MSC: 68P25 PDFBibTeX XMLCite \textit{Y. Kang} et al., J. Softw. 27, No. 6, 1487--1497 (2016; Zbl 1363.68076) Full Text: DOI
Zhou, Fucai; Peng, Su; Xu, Jian; Xu, Zifeng Identity-based batch provable data possession. (English) Zbl 1381.94092 Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 112-129 (2016). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{F. Zhou} et al., Lect. Notes Comput. Sci. 10005, 112--129 (2016; Zbl 1381.94092) Full Text: DOI
Gong, Junqing; Dong, Xiaolei; Chen, Jie; Cao, Zhenfu Efficient IBE with tight reduction to standard assumption in the multi-challenge setting. (English) Zbl 1407.94111 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 624-654 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Gong} et al., Lect. Notes Comput. Sci. 10032, 624--654 (2016; Zbl 1407.94111) Full Text: DOI
He, Kai; Weng, Jian; Deng, Robert H.; Liu, Joseph K. On the security of two identity-based conditional proxy re-encryption schemes. (English) Zbl 1371.94641 Theor. Comput. Sci. 652, 18-27 (2016). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. He} et al., Theor. Comput. Sci. 652, 18--27 (2016; Zbl 1371.94641) Full Text: DOI
Chen, Jie; Libert, Benoît; Ramanna, Somindu C. Non-zero inner product encryption with short ciphertexts and private keys. (English) Zbl 1400.94135 Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-44617-2/pbk; 978-3-319-44618-9/ebook). Lecture Notes in Computer Science 9841, 23-41 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Chen} et al., Lect. Notes Comput. Sci. 9841, 23--41 (2016; Zbl 1400.94135) Full Text: DOI Link
Zhu, Shuaishuai; Yang, Xiaoyuan; Han, Yiliang Efficient broadcasting encryption scheme based on multilinear map. (Chinese. English summary) Zbl 1363.68085 J. Wuhan Univ., Nat. Sci. Ed. 62, No. 2, 161-164 (2016). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{S. Zhu} et al., J. Wuhan Univ., Nat. Sci. Ed. 62, No. 2, 161--164 (2016; Zbl 1363.68085) Full Text: DOI
Yang, Haibin A new hierarchical identity-based encryption scheme based on lattice. (Chinese. English summary) Zbl 1363.68083 J. Wuhan Univ., Nat. Sci. Ed. 62, No. 2, 155-160 (2016). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{H. Yang}, J. Wuhan Univ., Nat. Sci. Ed. 62, No. 2, 155--160 (2016; Zbl 1363.68083) Full Text: DOI
Lai, Jianchang; Mu, Yi; Guo, Fuchun; Susilo, Willy; Chen, Rongmao Anonymous identity-based broadcast encryption with revocation for file sharing. (English) Zbl 1346.94108 Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 223-239 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Lai} et al., Lect. Notes Comput. Sci. 9723, 223--239 (2016; Zbl 1346.94108) Full Text: DOI Link
He, Kai; Weng, Jian; Au, Man Ho; Mao, Yijun; Deng, Robert H. Generic anonymous identity-based broadcast encryption with chosen-ciphertext security. (English) Zbl 1346.94104 Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 207-222 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{K. He} et al., Lect. Notes Comput. Sci. 9723, 207--222 (2016; Zbl 1346.94104) Full Text: DOI Link
Luo, Xiling; Ren, Yili; Liu, Jingwen; Hu, Jiankun; Liu, Weiran; Wang, Zhen; Xu, Wei; Wu, Qianhong Identity-based group encryption. (English) Zbl 1346.94115 Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 87-102 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Luo} et al., Lect. Notes Comput. Sci. 9723, 87--102 (2016; Zbl 1346.94115) Full Text: DOI
Gong, Junqing; Cao, Zhenfu; Tang, Shaohua; Chen, Jie Extended dual system group and shorter unbounded hierarchical identity based encryption. (English) Zbl 1348.94050 Des. Codes Cryptography 80, No. 3, 525-559 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Gong} et al., Des. Codes Cryptography 80, No. 3, 525--559 (2016; Zbl 1348.94050) Full Text: DOI
Wang, Fenghe; Liu, Zhenhua; Wang, Chunxiao Full secure identity-based encryption scheme with short public key size over lattices in the standard model. (English) Zbl 1362.68067 Int. J. Comput. Math. 93, No. 6, 854-863 (2016). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{F. Wang} et al., Int. J. Comput. Math. 93, No. 6, 854--863 (2016; Zbl 1362.68067) Full Text: DOI
Mahmoody, Mohammad; Mohammed, Ameer On the power of hierarchical identity-based encryption. (English) Zbl 1369.94556 Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49895-8/pbk; 978-3-662-49896-5/ebook). Lecture Notes in Computer Science 9666, 243-272 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Mahmoody} and \textit{A. Mohammed}, Lect. Notes Comput. Sci. 9666, 243--272 (2016; Zbl 1369.94556) Full Text: DOI
Singh, Kunwar; Rangan, C. Pandu; Banerjee, A. K. Lattice-based identity-based resplittable threshold public key encryption scheme. (English) Zbl 1376.94045 Int. J. Comput. Math. 93, No. 2, 289-307 (2016). MSC: 94A60 94A62 68W20 PDFBibTeX XMLCite \textit{K. Singh} et al., Int. J. Comput. Math. 93, No. 2, 289--307 (2016; Zbl 1376.94045) Full Text: DOI
Zhang, Jie; Ge, Aijun; Xiao, Siyu; Ma, Chuangui Fully secure IBE with tighter reduction in prime order bilinear groups. (English) Zbl 1384.94115 Qing, Sihan (ed.) et al., Information and communications security. 17th international conference, ICICS 2015, Beijing, China, December 9–11, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-29813-9/pbk; 978-3-319-29814-6/ebook). Lecture Notes in Computer Science 9543, 260-268 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Zhang} et al., Lect. Notes Comput. Sci. 9543, 260--268 (2016; Zbl 1384.94115) Full Text: DOI
Vergnaud, Damien Comment on “A strong provably secure IBE scheme without bilinear map” by M. Zheng, Y. Xiang and H. Zhou. (English) Zbl 1339.94070 J. Comput. Syst. Sci. 82, No. 5, 756-757 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Vergnaud}, J. Comput. Syst. Sci. 82, No. 5, 756--757 (2016; Zbl 1339.94070) Full Text: DOI
Watanabe, Yohei; Shikata, Junji Identity-based hierarchical key-insulated encryption without random oracles. (English) Zbl 1388.94084 Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49383-0/pbk; 978-3-662-49384-7/ebook). Lecture Notes in Computer Science 9614, 255-279 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Watanabe} and \textit{J. Shikata}, Lect. Notes Comput. Sci. 9614, 255--279 (2016; Zbl 1388.94084) Full Text: DOI
Joye, Marc Identity-based cryptosystems and quadratic residuosity. (English) Zbl 1388.94062 Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49383-0/pbk; 978-3-662-49384-7/ebook). Lecture Notes in Computer Science 9614, 225-254 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Joye}, Lect. Notes Comput. Sci. 9614, 225--254 (2016; Zbl 1388.94062) Full Text: DOI
Lai, Junzuo; Deng, Robert H.; Ma, Changshe; Sakurai, Kouichi; Weng, Jian CCA-secure keyed-fully homomorphic encryption. (English) Zbl 1388.94067 Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49383-0/pbk; 978-3-662-49384-7/ebook). Lecture Notes in Computer Science 9614, 70-98 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Lai} et al., Lect. Notes Comput. Sci. 9614, 70--98 (2016; Zbl 1388.94067) Full Text: DOI Link
Wee, Hoeteck Déjà Q: encore! Un petit IBE. (English) Zbl 1377.94067 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 237-258 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Wee}, Lect. Notes Comput. Sci. 9563, 237--258 (2016; Zbl 1377.94067) Full Text: DOI
Abusalah, Hamza; Fuchsbauer, Georg; Pietrzak, Krzysztof Constrained PRFs for unbounded inputs. (English) Zbl 1334.94053 Sako, Kazue (ed.), Topics in cryptology – CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 – March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 413-428 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Abusalah} et al., Lect. Notes Comput. Sci. 9610, 413--428 (2016; Zbl 1334.94053) Full Text: DOI Link
Park, Jong Hwan; Lee, Dong Hoon An efficient IBE scheme with tight security reduction in the random oracle model. (English) Zbl 1361.94046 Des. Codes Cryptography 79, No. 1, 63-85 (2016). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. H. Park} and \textit{D. H. Lee}, Des. Codes Cryptography 79, No. 1, 63--85 (2016; Zbl 1361.94046) Full Text: DOI
Song, Xiuli; Liu, Yanbing Cryptanalysis and improvement of verifiable quantum \((k,n)\) secret sharing. (English) Zbl 1333.81126 Quantum Inf. Process. 15, No. 2, 851-868 (2016). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{X. Song} and \textit{Y. Liu}, Quantum Inf. Process. 15, No. 2, 851--868 (2016; Zbl 1333.81126) Full Text: DOI
Seo, Jae Hong; Emura, Keita Revocable hierarchical identity-based encryption via history-free approach. (English) Zbl 1338.94082 Theor. Comput. Sci. 615, 45-60 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{J. H. Seo} and \textit{K. Emura}, Theor. Comput. Sci. 615, 45--60 (2016; Zbl 1338.94082) Full Text: DOI
Susilo, Willy; Guo, Fuchun; Mu, Yi Efficient dynamic threshold identity-based encryption with constant-size ciphertext. (English) Zbl 1358.94078 Theor. Comput. Sci. 609, Part 1, 49-59 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Susilo} et al., Theor. Comput. Sci. 609, Part 1, 49--59 (2016; Zbl 1358.94078) Full Text: DOI
Cheng, Shantian; Zhang, Juanyang Adaptive-ID secure revocable identity-based encryption from lattices via subset difference method. (English) Zbl 1403.94050 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 283-297 (2015). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Cheng} and \textit{J. Zhang}, Lect. Notes Comput. Sci. 9065, 283--297 (2015; Zbl 1403.94050) Full Text: DOI
He, Jingnan; Li, Bao; Lu, Xianhui; Jia, Dingding; Xue, Haiyang; Sun, Xiaochao Identity-based lossy encryption from learning with errors. (English) Zbl 1398.68136 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 3-20 (2015). MSC: 68P25 PDFBibTeX XMLCite \textit{J. He} et al., Lect. Notes Comput. Sci. 9241, 3--20 (2015; Zbl 1398.68136) Full Text: DOI
Park, Jong Hwan; Lee, Kwangsu; Lee, Dong Hoon New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem. (English) Zbl 1391.94786 Inf. Sci. 325, 256-270 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{J. H. Park} et al., Inf. Sci. 325, 256--270 (2015; Zbl 1391.94786) Full Text: DOI
Fan, Chun-I; Tseng, Yi-Fan Anonymous multi-receiver identity-based authenticated encryption with CCA security. (English) Zbl 1418.94046 Symmetry 7, No. 4, 1856-1881 (2015). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{C.-I Fan} and \textit{Y.-F. Tseng}, Symmetry 7, No. 4, 1856--1881 (2015; Zbl 1418.94046) Full Text: DOI
Yu, Huifang; Yang, Bo Identity-based hybrid signcryption scheme using ECC. (Chinese. English summary) Zbl 1349.94140 J. Softw. 26, No. 12, 3174-3182 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{H. Yu} and \textit{B. Yang}, J. Softw. 26, No. 12, 3174--3182 (2015; Zbl 1349.94140) Full Text: DOI
Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota A framework for identity-based encryption with almost tight security. (English) Zbl 1380.94069 Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 521-549 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Attrapadung} et al., Lect. Notes Comput. Sci. 9452, 521--549 (2015; Zbl 1380.94069) Full Text: DOI
Hofheinz, Dennis; Matt, Christian; Maurer, Ueli Idealizing identity-based encryption. (English) Zbl 1396.94083 Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 495-520 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Hofheinz} et al., Lect. Notes Comput. Sci. 9452, 495--520 (2015; Zbl 1396.94083) Full Text: DOI
Wang, Changji; Xu, Xilei; Li, Yuan; Shi, Dongyuan Integrating ciphertext-policy attribute-based encryption with identity-based ring signature to enhance security and privacy in wireless body area networks. (English) Zbl 1403.94086 Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 424-442 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Wang} et al., Lect. Notes Comput. Sci. 8957, 424--442 (2015; Zbl 1403.94086) Full Text: DOI
Lai, Russell W. F.; Cheung, Henry K. F.; Chow, Sherman S. M. Trapdoors for ideal lattices with applications. (English) Zbl 1400.94161 Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 239-256 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{R. W. F. Lai} et al., Lect. Notes Comput. Sci. 8957, 239--256 (2015; Zbl 1400.94161) Full Text: DOI