In public key encryption (PKE), anonymity is essential to ensure privacy by preventing the ciphertext from revealing the recipient’s identity. However, the literature has addressed the anonymity of PKE under different attack scenarios to a limited extent. Benhamouda et al. (TCC 2020) introduced the first formal definition of anonymity for PKE under corruption, and Huang et al. (ASIACRYPT 2022) made further extensions and provided a generic framework. In this paper, we introduce a new security notion named enhanced decryption key exposure resistance (En-DKER) for revocable identity-based encryption (RIBE). This notion ensures that the exposure of decryption keys within any time period will not compromise the confidentiality and anonymity...
We construct an efficient identity based encryption system based on the standard learning with error...
In case the subscriber\u27s certificate may be expired or revealed, a revocable mechanism is needed ...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
Revocable identity-based encryption (RIBE) is an extension of IBE that supports a key revocation mec...
Abstract Attribute‐based encryption (ABE) is a promising management method that enables fine‐grained...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as pu...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as public k...
In the last decade, lattices have become one of the most powerful tools in constructing cryptographi...
The emergence of quantum computing threatens many classical cryptographic schemes, leading to the in...
Deterministic public key encryption (D-PKE) provides an alternative to randomized public key encrypt...
A revocation mechanism in cryptosystems for a large number of users is absolutely necessary to maint...
This paper presents ongoing work toward constructing efficient completely non-malleable public-key e...
The notion of decryption rights delegation was initially introduced by Blaze et al. in EUROCRYPT 199...
As more Internet users are getting interested in using cloud services for storing sensitive data, it...
Identity-based revocation (IBR) is a specific kind of broadcast encryption that can effectively send...
We construct an efficient identity based encryption system based on the standard learning with error...
In case the subscriber\u27s certificate may be expired or revealed, a revocable mechanism is needed ...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
Revocable identity-based encryption (RIBE) is an extension of IBE that supports a key revocation mec...
Abstract Attribute‐based encryption (ABE) is a promising management method that enables fine‐grained...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as pu...
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as public k...
In the last decade, lattices have become one of the most powerful tools in constructing cryptographi...
The emergence of quantum computing threatens many classical cryptographic schemes, leading to the in...
Deterministic public key encryption (D-PKE) provides an alternative to randomized public key encrypt...
A revocation mechanism in cryptosystems for a large number of users is absolutely necessary to maint...
This paper presents ongoing work toward constructing efficient completely non-malleable public-key e...
The notion of decryption rights delegation was initially introduced by Blaze et al. in EUROCRYPT 199...
As more Internet users are getting interested in using cloud services for storing sensitive data, it...
Identity-based revocation (IBR) is a specific kind of broadcast encryption that can effectively send...
We construct an efficient identity based encryption system based on the standard learning with error...
In case the subscriber\u27s certificate may be expired or revealed, a revocable mechanism is needed ...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...