Search
Search Results
-
Efficient identity-based encryption with Hierarchical key-insulation from HIBE
Hierarchical key-insulated identity-based encryption (HKIBE) is identity-based encryption (IBE) that allows users to update their secret keys to...
-
Unique-Path Identity Based Encryption with Applications to Strongly Secure Messaging
Hierarchical Identity Based Encryption (HIBE) is a well studied, versatile tool used in many cryptographic protocols. Yet, since the performance of... -
Unbounded HIBE with Tight Security
We propose the first tightly secure and unbounded hierarchical identity-based encryption (HIBE) scheme based on standard assumptions. Our main... -
Lattice HIBE with Faster Trapdoor Delegation and Applications
In this paper, we propose a lattice-based HIBE scheme in the standard model with faster trapdoor delegation. It is proven secure under the Learning... -
On Adaptively Secure Prefix Encryption Under LWE
Prefix Encryption is a public-key encryption scheme, where ciphertexts are associated with a string y and secret keys are associated with a string x.... -
Adaptively secure revocable hierarchical IBE from k-linear assumption
Revocable identity-based encryption (RIBE) is an extension of IBE with an efficient key revocation mechanism. Revocable hierarchical IBE (RHIBE) is...
-
Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption
In this paper, we extend the notion of server-aided revocable identity-based encryption (SR-IBE) to the hierarchical IBE (HIBE) setting to obtain the... -
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model
At CRYPTO 2017, Roşca, Sakzad, Stehlé and Steinfeld introduced the Middle–Product LWE (MPLWE) assumption which is as secure as Polynomial-LWE for a... -
Forward-Secure Encryption with Fast Forwarding
Forward-secure encryption (FSE) allows communicating parties to refresh their keys across epochs, in a way that compromising the current secret key... -
Tightly Secure Hierarchical Identity-Based Encryption
We construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open...
-
Master-Key KDM-Secure ABE via Predicate Encoding
In this paper, we propose the first generic framework for attribute-based encryptions (ABE) with master-secret-key-dependent-message security (mKDM... -
Updatable Public Key Encryption in the Standard Model
Forward security (FS) ensures that corrupting the current secret key in the system preserves the privacy or integrity of the prior usages of the... -
CCA-Secure Identity-Based Matchmaking Encryption from Standard Assumptions
Identity-based Matchmaking Encryption (IB-ME) is a new form of encryption that enables anonymous communication by specifying identities for both... -
Identifier discrimination: realizing selective-ID HIBE with authorized delegation and dedicated encryption privacy
It has been almost one and a half decades since the introduction of the concept of hierarchical identity-based encryption (HIBE) systems, and many...
-
Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions
Döttling and Garg (CRYPTO 2017) introduced a non-black-box approach to identity-based encryption (IBE). This paves the way for the first and still... -
Fork-Resilient Continuous Group Key Agreement
Continuous Group Key Agreement (CGKA) lets an evolving group of clients agree on a sequence of group keys. An important application of CGKA is... -
Introduction to SAGIN Security
Space-air-ground Integrated Network (SAGIN) is expected to play an increasing role in providing real-time, flexible, and integrated communication and... -
Simpler Constructions of Asymmetric Primitives from Obfuscation
We revisit constructions of asymmetric primitives from obfuscation and give simpler alternatives. We consider public-key encryption, (hierarchical)... -
Forward Security Under Leakage Resilience, Revisited
As both notions employ the same key-evolution paradigm, Bellare et al. (CANS 2017) study combining forward security with leakage resilience. The idea... -
More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model
Identity-based encryption with equality test (IBEET) is a variant of identity-based encryption (IBE), where any users who have trapdoors can check...