We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 591 results
  1. Efficient identity-based encryption with Hierarchical key-insulation from HIBE

    Hierarchical key-insulated identity-based encryption (HKIBE) is identity-based encryption (IBE) that allows users to update their secret keys to...

    Keita Emura, Atsushi Takayasu, Yohei Watanabe in Designs, Codes and Cryptography
    Article Open access 03 September 2021
  2. Unique-Path Identity Based Encryption with Applications to Strongly Secure Messaging

    Hierarchical Identity Based Encryption (HIBE) is a well studied, versatile tool used in many cryptographic protocols. Yet, since the performance of...
    Paul Rösler, Daniel Slamanig, Christoph Striecks in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  3. Unbounded HIBE with Tight Security

    We propose the first tightly secure and unbounded hierarchical identity-based encryption (HIBE) scheme based on standard assumptions. Our main...
    Roman Langrehr, Jiaxin Pan in Advances in Cryptology – ASIACRYPT 2020
    Conference paper 2020
  4. Lattice HIBE with Faster Trapdoor Delegation and Applications

    In this paper, we propose a lattice-based HIBE scheme in the standard model with faster trapdoor delegation. It is proven secure under the Learning...
    Guofeng Tang, Tian Qiu in Information and Communications Security
    Conference paper 2020
  5. On Adaptively Secure Prefix Encryption Under LWE

    Prefix Encryption is a public-key encryption scheme, where ciphertexts are associated with a string y and secret keys are associated with a string x....
    Conference paper 2023
  6. Adaptively secure revocable hierarchical IBE from k-linear assumption

    Revocable identity-based encryption (RIBE) is an extension of IBE with an efficient key revocation mechanism. Revocable hierarchical IBE (RHIBE) is...

    Keita Emura, Atsushi Takayasu, Yohei Watanabe in Designs, Codes and Cryptography
    Article 15 May 2021
  7. Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption

    In this paper, we extend the notion of server-aided revocable identity-based encryption (SR-IBE) to the hierarchical IBE (HIBE) setting to obtain the...
    Yanyan Liu, Yiru Sun in Information Security and Cryptology
    Conference paper 2021
  8. Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model

    At CRYPTO 2017, Roşca, Sakzad, Stehlé and Steinfeld introduced the Middle–Product LWE (MPLWE) assumption which is as secure as Polynomial-LWE for a...
    Huy Quoc Le, Dung Hoang Duong, ... Josef Pieprzyk in Applied Cryptography and Network Security
    Conference paper 2020
  9. Forward-Secure Encryption with Fast Forwarding

    Forward-secure encryption (FSE) allows communicating parties to refresh their keys across epochs, in a way that compromising the current secret key...
    Yevgeniy Dodis, Daniel Jost, Harish Karthikeyan in Theory of Cryptography
    Conference paper 2022
  10. Tightly Secure Hierarchical Identity-Based Encryption

    We construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open...

    Roman Langrehr, Jiaxin Pan in Journal of Cryptology
    Article Open access 15 September 2020
  11. Master-Key KDM-Secure ABE via Predicate Encoding

    In this paper, we propose the first generic framework for attribute-based encryptions (ABE) with master-secret-key-dependent-message security (mKDM...
    Shengyuan Feng, Junqing Gong, Jie Chen in Public-Key Cryptography – PKC 2021
    Conference paper 2021
  12. Updatable Public Key Encryption in the Standard Model

    Forward security (FS) ensures that corrupting the current secret key in the system preserves the privacy or integrity of the prior usages of the...
    Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs in Theory of Cryptography
    Conference paper 2021
  13. CCA-Secure Identity-Based Matchmaking Encryption from Standard Assumptions

    Identity-based Matchmaking Encryption (IB-ME) is a new form of encryption that enables anonymous communication by specifying identities for both...
    Shen Lin, Yu Li, Jie Chen in Information Security and Cryptology
    Conference paper 2024
  14. Identifier discrimination: realizing selective-ID HIBE with authorized delegation and dedicated encryption privacy

    It has been almost one and a half decades since the introduction of the concept of hierarchical identity-based encryption (HIBE) systems, and many...

    Jian-Wu Zheng, **g Zhao, **n-** Guan in International Journal of Information Security
    Article 07 March 2018
  15. Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions

    Döttling and Garg (CRYPTO 2017) introduced a non-black-box approach to identity-based encryption (IBE). This paves the way for the first and still...
    Huangting Wu, Sherman S. M. Chow in Applied Cryptography and Network Security
    Conference paper 2023
  16. Fork-Resilient Continuous Group Key Agreement

    Continuous Group Key Agreement (CGKA) lets an evolving group of clients agree on a sequence of group keys. An important application of CGKA is...
    Joël Alwen, Marta Mularczyk, Yiannis Tselekounis in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  17. Introduction to SAGIN Security

    Space-air-ground Integrated Network (SAGIN) is expected to play an increasing role in providing real-time, flexible, and integrated communication and...
    Jianwei Liu, Lin Bai, ... Wei Zhang in Space-Air-Ground Integrated Network Security
    Chapter 2023
  18. Simpler Constructions of Asymmetric Primitives from Obfuscation

    We revisit constructions of asymmetric primitives from obfuscation and give simpler alternatives. We consider public-key encryption, (hierarchical)...
    Pooya Farshim, Georg Fuchsbauer, Alain Passelègue in Progress in Cryptology – INDOCRYPT 2020
    Conference paper 2020
  19. Forward Security Under Leakage Resilience, Revisited

    As both notions employ the same key-evolution paradigm, Bellare et al. (CANS 2017) study combining forward security with leakage resilience. The idea...
    Suvradip Chakraborty, Harish Karthikeyan, ... C. Pandu Rangan in Cryptology and Network Security
    Conference paper 2023
  20. More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model

    Identity-based encryption with equality test (IBEET) is a variant of identity-based encryption (IBE), where any users who have trapdoors can check...
    Kyoichi Asano, Keita Emura, Atsushi Takayasu in Information Security
    Conference paper 2022
Did you find what you were looking for? Share feedback.