We propose the first tightly secure and unbounded hierarchical identity-based encryption (HIBE) scheme based on standard assumptions. Our main technical contribution is a novel proof strategy that allows us to tightly randomize user secret keys for identities with arbitrary hierarchy depths using low entropy hidden in a small and hierarchy-independent master public key. The notion of unbounded HIBE is proposed by Lewko and Waters (Eurocrypt 2011). In contrast to most HIBE schemes, an unbounded scheme does not require any maximum depth to be specified in the setup phase, and user secret keys or ciphertexts can be generated for identities of arbitrary depths with hierarchy-independent system parameters. While all the previous unbounded HIBE...
We prove that there is no fully black-box construction of collision-resistant hash functions (CRH) f...
Efficient and privacy-preserving constructions for search functionality on encrypted data is importa...
A forward-secure encryption scheme protects secret keys from exposure by evolving the keys with time...
We propose the first tightly secure and unbounded hierarchical identity-based encryption (HIBE) sche...
We construct the first hierarchical identity-based encryption (HIBE) scheme with tight adaptive secu...
Abstract. We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext con...
Almost all existing hierarchical identity-based encryption (HIBE) schemes fully se-cure in the stand...
Hierarchical identity-based encryption (HIBE) is a generalization of identity-based encryption (IBE)...
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of j...
Abstract. We present two hierarchical identity-based encryption (HIBE) schemes, denoted as H1 and H2...
We present a new construction of anonymous hierarchical identity-based encryption (HIBE) over prime ...
Hierarchical Identity-Based Encryption (HIBE) is a generalisation of Identity-Based Encryption (IBE)...
Abstract. In Informatica 32 (2008), Ren and Gu proposed an anonymous hierarchical identity based enc...
Hierarchical identity-based encryption (HIBE) is an extension of identity-based encryption (IBE) whe...
Proving security of Hierarchical Identity-Based Encryption (HIBE) and Attribution Based Encryption s...
We prove that there is no fully black-box construction of collision-resistant hash functions (CRH) f...
Efficient and privacy-preserving constructions for search functionality on encrypted data is importa...
A forward-secure encryption scheme protects secret keys from exposure by evolving the keys with time...
We propose the first tightly secure and unbounded hierarchical identity-based encryption (HIBE) sche...
We construct the first hierarchical identity-based encryption (HIBE) scheme with tight adaptive secu...
Abstract. We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext con...
Almost all existing hierarchical identity-based encryption (HIBE) schemes fully se-cure in the stand...
Hierarchical identity-based encryption (HIBE) is a generalization of identity-based encryption (IBE)...
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of j...
Abstract. We present two hierarchical identity-based encryption (HIBE) schemes, denoted as H1 and H2...
We present a new construction of anonymous hierarchical identity-based encryption (HIBE) over prime ...
Hierarchical Identity-Based Encryption (HIBE) is a generalisation of Identity-Based Encryption (IBE)...
Abstract. In Informatica 32 (2008), Ren and Gu proposed an anonymous hierarchical identity based enc...
Hierarchical identity-based encryption (HIBE) is an extension of identity-based encryption (IBE) whe...
Proving security of Hierarchical Identity-Based Encryption (HIBE) and Attribution Based Encryption s...
We prove that there is no fully black-box construction of collision-resistant hash functions (CRH) f...
Efficient and privacy-preserving constructions for search functionality on encrypted data is importa...
A forward-secure encryption scheme protects secret keys from exposure by evolving the keys with time...