×

Found 385 Documents (Results 101–200)

Downgradable identity-based encryption and applications. (English) Zbl 1453.94061

Matsui, Mitsuru (ed.), Topics in cryptology – CT-RSA 2019. The cryptographers’ track at the RSA conference 2019, San Francisco, CA, USA, March 4–8, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11405, 44-61 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Lattice-based IBE with equality test in standard model. (English) Zbl 1426.94094

Steinfeld, Ron (ed.) et al., Provable security. 13th international conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11821, 19-40 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Identity-based combined public key schemes for signature, encryption, and signcryption. (English) Zbl 1417.94090

Chandra, Peeyush (ed.) et al., Information technology and applied mathematics. ICITAM 2017, Haldia Institute of Technology, Haldia, India, October 30 – November 1, 2017. Singapore: Springer. Adv. Intell. Syst. Comput. 699, 3-22 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New assumptions on isogenous pairing groups with applications to attribute-based encryption. (English) Zbl 1433.68121

Lee, Kwangsu (ed.), Information security and cryptology – ICISC 2018. 21st international conference, Seoul, South Korea, November 28–30, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11396, 3-19 (2019).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Leveled hierarchical identity-based fully homomorphic encryption from learning with rounding. (English) Zbl 1515.68119

Su, Chunhua (ed.) et al., Information security practice and experience. 14th international conference, ISPEC 2018, Tokyo, Japan, September 25–27, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11125, 101-115 (2018).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Identity-based encryption resilient to auxiliary leakage under the decisional linear assumption. (English) Zbl 1518.94069

Camenisch, Jan (ed.) et al., Cryptology and network security. 17th international conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11124, 417-439 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Key dependent message security for revocable identity-based encryption and identity-based encryption. (English) Zbl 1458.94289

Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 426-441 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

SecHome: a secure large-scale smart home system using hierarchical identity based encryption. (English) Zbl 1452.94077

Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 339-351 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Compact hierarchical IBE from lattices in the standard model. (English) Zbl 1452.94095

Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 210-221 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Identity-based group encryption revisited. (English) Zbl 1452.94068

Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 205-209 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Revocable identity-based encryption from codes with rank metric. (English) Zbl 1507.94033

Smart, Nigel P. (ed.), Topics in cryptology – CT-RSA 2018. The cryptographers’ track at the RSA conference 2018, San Francisco, CA, USA, April 16–20, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10808, 435-451 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Tighter security proofs for GPV-IBE in the quantum random oracle model. (English) Zbl 1446.94144

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 253-282 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Short digital signatures and ID-KEMs via truncation collision resistance. (English) Zbl 1446.94141

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 221-250 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Identity-based encryption tightly secure under chosen-ciphertext attacks. (English) Zbl 1446.94137

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 190-220 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Two attacks on rank metric code-based schemes: RankSign and an IBE scheme. (English) Zbl 1446.94124

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 62-92 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv Link

Registration-based encryption: removing private-key generator from IBE. (English) Zbl 1443.94057

Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 689-718 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A CCA-secure collusion-resistant identity-based proxy re-encryption scheme. (English) Zbl 1421.94065

Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 111-128 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Compact IBBE and fuzzy IBE from simple assumptions. (English) Zbl 1517.94103

Catalano, Dario (ed.) et al., Security and cryptography for networks. 11th international conference, SCN 2018, Amalfi, Italy, September 5–7, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11035, 563-582 (2018).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Lattice-based dual receiver encryption and more. (English) Zbl 1444.94114

Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 520-538 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Revocable identity-based encryption from the computational Diffie-Hellman problem. (English) Zbl 1444.94071

Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 265-283 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Anonymous IBE, leakage resilience and circular security from new assumptions. (English) Zbl 1423.94056

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10820, 535-564 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Key dependent message security and receiver selective opening security for identity-based encryption. (English) Zbl 1385.94050

Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-76577-8/pbk; 978-3-319-76578-5/ebook). Lecture Notes in Computer Science 10769, 32-61 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New proof for BKP IBE scheme and improvement in the MIMC setting. (English) Zbl 1506.94056

Liu, Joseph K. (ed.) et al., Information security practice and experience. 13th international conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10701, 136-155 (2017).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Hierarchical conditional proxy re-encryption: a new insight of fine-grained secure data sharing. (English) Zbl 1503.68059

Liu, Joseph K. (ed.) et al., Information security practice and experience. 13th international conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10701, 118-135 (2017).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Generic constructions for fully secure revocable attribute-based encryption. (English) Zbl 1522.68092

Foley, Simon N. (ed.) et al., Computer security – ESORICS 2017. 22nd European symposium on research in computer security, Oslo, Norway, September 11–15, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10493, 532-551 (2017).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Deterministic identity-based encryption from lattices with more compact public parameters. (English) Zbl 1398.94184

Obana, Satoshi (ed.) et al., Advances in information and computer security. 12th international workshop on security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-64199-7/pbk; 978-3-319-64200-0/ebook). Lecture Notes in Computer Science 10418, 215-230 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A practical implementation of identity-based encryption over NTRU lattices. (English) Zbl 1397.94089

O’Neill, Máire (ed.), Cryptography and coding. 16th IMA international conference, IMACC 2017, Oxford, UK, December 12–14, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-71044-0/pbk; 978-3-319-71045-7/ebook). Lecture Notes in Computer Science 10655, 227-246 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Mergeable and revocable identity-based encryption. (English) Zbl 1386.94089

Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 147-167 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters. (English) Zbl 1383.94049

Handschuh, Helena (ed.), Topics in cryptology – CT-RSA 2017. The cryptographers’ track at the RSA conference 2017, San Francisco, CA, USA, February 14–17, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-52152-7/pbk; 978-3-319-52153-4/ebook). Lecture Notes in Computer Science 10159, 432-449 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Identity-based batch provable data possession. (English) Zbl 1381.94092

Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 112-129 (2016).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Efficient IBE with tight reduction to standard assumption in the multi-challenge setting. (English) Zbl 1407.94111

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 624-654 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Non-zero inner product encryption with short ciphertexts and private keys. (English) Zbl 1400.94135

Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-44617-2/pbk; 978-3-319-44618-9/ebook). Lecture Notes in Computer Science 9841, 23-41 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Anonymous identity-based broadcast encryption with revocation for file sharing. (English) Zbl 1346.94108

Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 223-239 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Generic anonymous identity-based broadcast encryption with chosen-ciphertext security. (English) Zbl 1346.94104

Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 207-222 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Identity-based group encryption. (English) Zbl 1346.94115

Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 87-102 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the power of hierarchical identity-based encryption. (English) Zbl 1369.94556

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49895-8/pbk; 978-3-662-49896-5/ebook). Lecture Notes in Computer Science 9666, 243-272 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully secure IBE with tighter reduction in prime order bilinear groups. (English) Zbl 1384.94115

Qing, Sihan (ed.) et al., Information and communications security. 17th international conference, ICICS 2015, Beijing, China, December 9–11, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-29813-9/pbk; 978-3-319-29814-6/ebook). Lecture Notes in Computer Science 9543, 260-268 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Identity-based hierarchical key-insulated encryption without random oracles. (English) Zbl 1388.94084

Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49383-0/pbk; 978-3-662-49384-7/ebook). Lecture Notes in Computer Science 9614, 255-279 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Identity-based cryptosystems and quadratic residuosity. (English) Zbl 1388.94062

Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49383-0/pbk; 978-3-662-49384-7/ebook). Lecture Notes in Computer Science 9614, 225-254 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

CCA-secure keyed-fully homomorphic encryption. (English) Zbl 1388.94067

Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49383-0/pbk; 978-3-662-49384-7/ebook). Lecture Notes in Computer Science 9614, 70-98 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Déjà Q: encore! Un petit IBE. (English) Zbl 1377.94067

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 237-258 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Constrained PRFs for unbounded inputs. (English) Zbl 1334.94053

Sako, Kazue (ed.), Topics in cryptology – CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 – March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 413-428 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Adaptive-ID secure revocable identity-based encryption from lattices via subset difference method. (English) Zbl 1403.94050

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 283-297 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Identity-based lossy encryption from learning with errors. (English) Zbl 1398.68136

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 3-20 (2015).
MSC:  68P25
PDFBibTeX XMLCite
Full Text: DOI

A framework for identity-based encryption with almost tight security. (English) Zbl 1380.94069

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 521-549 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Idealizing identity-based encryption. (English) Zbl 1396.94083

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 495-520 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Integrating ciphertext-policy attribute-based encryption with identity-based ring signature to enhance security and privacy in wireless body area networks. (English) Zbl 1403.94086

Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 424-442 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Trapdoors for ideal lattices with applications. (English) Zbl 1400.94161

Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 239-256 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software