Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involving any randomness, was introduced by Bellare, Boldyreva, and O'Neill (CRYPTO 2007) as a realistic alternative to some inherent drawbacks in randomized public-key encryption. Bellare, Kiltz, Peikert and Waters (EUROCRYPT 2012) bring deterministic public-key encryption to the identity-based setting, and propose deterministic identity-based encryption scheme (DIBE). Although the construc- tions of chosen plaintext attack (CPA) secure DIBE scheme have been studied intensively, the construction of chosen ciphertext attack (CCA) secure DIBE scheme is still challenging problems. In this paper, we introduce the notion of identity-based all-but-one tr...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
We describe a new and practical identity-based key encapsulation mechanism that is secure in the sta...
International audienceIn a selective-opening chosen ciphertext (SO-CCA) attack on an encryption sche...
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involvi...
The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO ’07), who p...
We propose a generic construction that yields efficient identity-based encryption (IBE) schemes secu...
AbstractWe describe a practical identity-based encryption scheme that is secure in the standard mode...
We describe a practical identity-based encryption scheme that is secure in the standard model agains...
Deterministic public key encryption (D-PKE) provides an alternative to randomized public key encrypt...
The British Computer Society 2018. All rights reserved. Provably secure identity-based encryption (I...
In this paper, we propose the notion of adaptive all-but-one lossy trapdoor functions (aABO-LTFs), a...
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...
We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes secure again...
Abstract. Security against selective opening attack (SOA) requires that in a multi-user setting, eve...
In this paper, we present a variant of Waters\u27 Identity-Based Encryption scheme with a much small...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
We describe a new and practical identity-based key encapsulation mechanism that is secure in the sta...
International audienceIn a selective-opening chosen ciphertext (SO-CCA) attack on an encryption sche...
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involvi...
The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO ’07), who p...
We propose a generic construction that yields efficient identity-based encryption (IBE) schemes secu...
AbstractWe describe a practical identity-based encryption scheme that is secure in the standard mode...
We describe a practical identity-based encryption scheme that is secure in the standard model agains...
Deterministic public key encryption (D-PKE) provides an alternative to randomized public key encrypt...
The British Computer Society 2018. All rights reserved. Provably secure identity-based encryption (I...
In this paper, we propose the notion of adaptive all-but-one lossy trapdoor functions (aABO-LTFs), a...
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...
We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes secure again...
Abstract. Security against selective opening attack (SOA) requires that in a multi-user setting, eve...
In this paper, we present a variant of Waters\u27 Identity-Based Encryption scheme with a much small...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
We describe a new and practical identity-based key encapsulation mechanism that is secure in the sta...
International audienceIn a selective-opening chosen ciphertext (SO-CCA) attack on an encryption sche...