Efficient identity-based encryption without random oracles (2005)

Cached

Download Links

by Brent Waters
Citations:229 - 15 self

Active Bibliography

6 Constant-size hierarchical identity-based signature/signcryption without random oracles – Tsz Hon Yuen, Victor K. Wei - 2006
65 Bonsai Trees, or How to Delegate a Lattice Basis – David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert - 2010
2 Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions. Cryptology ePrint Archive, Report 2007/030. Available at http://eprint.iacr.org/2007/030 – Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang
8 Efficient Selective Identity-based Encryption – Dan Boneh, Xavier Boyen - 1990
A Survey on ID-Based Cryptographic Primitives – M. Choudary Gorantla, Raju Gangishetti, Ashutosh Saxena - 2005
28 Direct chosen-ciphertext secure identity-based key encapsulation without random oracles – Eike Kiltz, David Galindo - 2006
1 Yet Another Short Signatures without Random Oracles from Bilinear Pairings – Fangguo Zhang, Xiaofeng Chen - 2005
5 A new short signature scheme without random oracles from bilinear pairings – Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu - 2005
2 A New Signature Scheme without Random Oracles and Its Applications ⋆ – Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu
Encryption Schemes from Bilinear Maps – Eu-jin Goh - 2007
162 Hierarchical identity based encryption with constant size ciphertext – Dan Boneh, Xavier Boyen, Eu-jin Goh - 2005
6 A tapestry of identity-based encryption: practical frameworks compared – X. Boyen
26 A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants – Hovav Shacham - 2007
96 Efficient Selective-ID Secure Identity Based Encryption without Random Oracles – Dan Boneh, Xavier Boyen - 2004
52 Efficient lattice (H)IBE in the standard model – Shweta Agrawal, Dan Boneh, Xavier Boyen - 2010
199 Chosen-Ciphertext Security from Identity-Based Encryption. Adv – Dan Boneh, Ran Canetti, Shai Halevi, Jonathan Katz - 2004
Specialization and Subordination from Sampling: Lattice-based A(H)IBE in the Plain Model – Shweta Agrawal, Xavier Boyen - 2009
8 Proxy Re-encryption Systems for Identity-based Encryption – Toshihiko Matsuo - 2007
2 The power of identification schemes – Kaoru Kurosawa, Swee-huay Heng - 2006