Search
Search Results
-
IBE-BCIOT: an IBE based cross-chain communication mechanism of blockchain in IoT
Cross-platform difficulties, data privacy, and authentication security are common problems in the Internet of Things (IoT) environment. Despite the...
-
-
Cloud-Aided Scalable Revocable IBE with Ciphertext Update from Lattices in the Random Oracle Model
Cloud-aided scalable revocable identity-based encryption with ciphertext update (CA-RIBE-CU), first introduced by Wang et al. in 2017 and the first... -
Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity
Revocable identity-based encryption (RIBE) is an extension of IBE that satisfies a key revocation mechanism to manage a number of users dynamically...
-
Adaptively secure revocable hierarchical IBE from k-linear assumption
Revocable identity-based encryption (RIBE) is an extension of IBE with an efficient key revocation mechanism. Revocable hierarchical IBE (RHIBE) is...
-
More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model
Identity-based encryption with equality test (IBEET) is a variant of identity-based encryption (IBE), where any users who have trapdoors can check... -
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model
In (STOC, 2008), Gentry, Peikert, and Vaikuntanathan proposed the first identity-based encryption (GPV-IBE) scheme based on a post-quantum...
-
Leakage-Resilient \(\mathsf {IBE}\) / \(\mathsf {ABE}\) with Optimal Leakage Rates from Lattices
We derive the first adaptively secure \(\mathsf {IBE}\)... -
Anonymous IBE from PEKS: A Generic Construction
Abdalla et al.[1, 6] proposed a transform of an anonymous IBE (A-IBE) scheme to a PEKS (Public key encryption with keyword search) scheme. Boneh et... -
IBE with Incompressible Master Secret and Small Identity Secrets
Side-step** the protection provided by cryptography, exfiltration attacks are becoming a considerable real-world threat. With the goal of... -
Extended Galbraith’s test on the anonymity of IBE schemes from higher residuosity
At PKC 2019, Clear and McGoldrick presented the first identity-based encryption (IBE) scheme that is group homomorphic for addition modulo a...
-
Revocable IBE with En-DKER from Lattices: A Novel Approach for Lattice Basis Delegation
In public key encryption (PKE), anonymity is essential to ensure privacy by preventing the ciphertext from revealing the recipient’s identity.... -
Lightweight Anonymous Communication Model Based on Anonymous IBE
With increasing application of big data technology, a large amount of personal information is stored and processed on the Internet, which makes... -
Bounded Collusion ABE for TMs from IBE
We give an attribute-based encryption system for Turing Machines that is provably secure assuming only the existence of identity-based encryption... -
-
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE
Our context is anonymous encryption schemes hiding their receiver, but in a setting which allows authorities to reveal the receiver when needed.... -
Leakage-resilient identity-based cryptography from minimal assumptions
Identity-based hash proof system (IB-HPS), a variant of hash proof system (HPS) in the identity-based setting, is a useful building block in...
-
Identity-Based Encryption from LWE with More Compact Master Public Key
This paper presents an adaptively secure identity-based encryption (IBE) scheme from Learning With Errors (LWE) in the standard model. Compared to... -
CCA-Secure Identity-Based Matchmaking Encryption from Standard Assumptions
Identity-based Matchmaking Encryption (IB-ME) is a new form of encryption that enables anonymous communication by specifying identities for both... -
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
We construct an identity-based encryption (IBE) scheme that is tightly secure in a very strong sense. Specifically, we consider a setting with many...