Efficient identity-based encryption without random oracles (2005)

Cached

Download Links

by Brent Waters
Citations:233 - 15 self

Active Bibliography

6 Constant-size hierarchical identity-based signature/signcryption without random oracles – - 2006
68 Bonsai Trees, or How to Delegate a Lattice Basis – - 2010
2 Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions. Cryptology ePrint Archive, Report 2007/030. Available at http://eprint.iacr.org/2007/030
8 Efficient Selective Identity-based Encryption – - 1990
A Survey on ID-Based Cryptographic Primitives – - 2005
89 Practical identity-based encryption without random oracles
28 Direct chosen-ciphertext secure identity-based key encapsulation without random oracles – - 2006
2 A New Signature Scheme without Random Oracles and Its Applications ⋆
1 Yet Another Short Signatures without Random Oracles from Bilinear Pairings – - 2005
5 A new short signature scheme without random oracles from bilinear pairings – - 2005
Encryption Schemes from Bilinear Maps – - 2007
168 Hierarchical identity based encryption with constant size ciphertext – - 2005
6 A tapestry of identity-based encryption: practical frameworks compared
26 A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants – - 2007
99 Efficient Selective-ID Secure Identity Based Encryption without Random Oracles – - 2004
52 Efficient lattice (H)IBE in the standard model – - 2010
Specialization and Subordination from Sampling: Lattice-based A(H)IBE in the Plain Model – - 2009
203 Chosen-Ciphertext Security from Identity-Based Encryption. Adv – - 2004
9 Proxy Re-encryption Systems for Identity-based Encryption – - 2007