Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption (2004)

Cached

Download Links

by Dan Boneh , Jonathan Katz
Citations:75 - 8 self

Active Bibliography

199 Chosen-Ciphertext Security from Identity-Based Encryption. Adv – Dan Boneh, Ran Canetti, Shai Halevi, Jonathan Katz - 2004
8 Efficient Selective Identity-based Encryption – Dan Boneh, Xavier Boyen - 1990
79 Lossy Trapdoor Functions and Their Applications – Chris Peikert, Brent Waters - 2007
A Survey on ID-Based Cryptographic Primitives – M. Choudary Gorantla, Raju Gangishetti, Ashutosh Saxena - 2005
189 Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack – Ronald Cramer, Victor Shoup - 2001
5 Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption – Rui Zhang, Hideki Imai
12 Efficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks – Jonathan Katz - 2002
5 Efficient Chosen-Ciphertext Security via Extractable Hash – Hoeteck Wee
12 Adaptively-Secure, Non-Interactive Public-Key Encryption – Ran Canetti, Shai Halevi, Jonathan Katz - 2004
13 Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract) – Philip MacKenzie, Michael K. Reiter, Ke Yang - 2004
2 Security Notions for Identity Based Encryption – David Galindo, Ichiro Hasuo - 2005
28 Direct chosen-ciphertext secure identity-based key encapsulation without random oracles – Eike Kiltz, David Galindo - 2006
20 Practical Chosen Ciphertext Secure Encryption from Factoring – Dennis Hofheinz, Eike Kiltz
3 Simulation-Sound Non-Interactive Zero Knowledge – Amit Sahai - 2001
1 Subtleties in the Definition of IND-CCA: When and How Should Challenge-Decryption be Disallowed? – Mihir Bellare, Dennis Hofheinz, Eike Kiltz
1 New Tools in Cryptography: Mutually Indepent Commitments, Tweakable Block Ciphers, and Plaintext Awareness via Key Registration – Silvio M. Micali - 2004
2 Non-interactive cca-secure threshold cryptosystems with adaptive security: New framework and constructions – Benoît Libert, Moti Yung - 2012
447 Non-Malleable Cryptography – Danny Dolev, Cynthia Dwork, Moni Naor - 2000
40 A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions – Yehuda Lindell - 2004