Efficient identity-based encryption without random oracles (2005)

Cached

Download Links

by Brent Waters
Citations:229 - 15 self

Documents Related by Co-Citation

1123 Identity-Based Encryption from the Weil Pairing – Dan Boneh, Matthew Franklin - 2001
714 Identity-based cryptosystems and signature schemes – A Shamir - 1984
184 Hierarchical ID-Based Cryptography – Craig Gentry, Alice Silverberg - 2002
201 A Forward-Secure Public-Key Encryption Scheme – Ran Canetti, Shai Halevi, Jonathan Katz - 2003
1333 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
109 Towards hierarchical identity-based encryption – Jeremy Horwitz, Ben Lynn - 2002
100 Secure Identity Based Encryption without Random Oracles – Dan Boneh, Xavier Boyen - 2004
199 Chosen-Ciphertext Security from Identity-Based Encryption. Adv – Dan Boneh, Ran Canetti, Shai Halevi, Jonathan Katz - 2004
141 Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles., in Cachin and Camenisch [13 – Dan Boneh, Xavier Boyen
162 Hierarchical identity based encryption with constant size ciphertext – Dan Boneh, Xavier Boyen, Eu-jin Goh - 2005
262 Short group signatures – Dan Boneh, Xavier Boyen, Hovav Shacham - 2004
199 Public Key Encryption with Keyword Search – Dan Boneh, Giovanni Di Crescenzo , Rafail Ostrovsky , Giuseppe Persiano
560 Short signatures from the Weil pairing – Dan Boneh, Ben Lynn, Hovav Shacham - 2001
81 Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. Full version of current paper. Available at IACR Cryptology ePrint Archive, http://eprint.iacr.org – Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-lee, Gregory Neven, Pascal Paillier, Haixia Shi
827 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
205 An identity based encryption scheme based on quadratic residues – Clifford Cocks - 2001
75 Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption – Dan Boneh, Jonathan Katz - 2004
166 Multiple Non-Interactive Zero-Knowledge Proofs Under General Assumptions – U Feige, D Lapidot, A Shamir - 1999
76 Anonymous hierarchical identity-based encryption (without random oracles – Xavier Boyen, Brent Waters