We propose the first tightly secure and unbounded hierarchical identity-based encryption (HIBE) scheme based on standard assumptions. Our main technical contribution is a novel proof strategy that allows us to tightly randomize user secret keys for identities with arbitrary hierarchy depths using low entropy hidden in a small and hierarchy-independent master public key. The notion of unbounded HIBE is proposed by Lewko and Waters (Eurocrypt 2011). In contrast to most HIBE schemes, an unbounded scheme does not require any maximum depth to be specified in the setup phase, and user secret keys or ciphertexts can be generated for identities of arbitrary depths with hierarchy-independent system parameters. While all the previous unbounded HIBE...
Abstract. We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext con...
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of j...
Starting with any selectively secure identity-based encryption (IBE) scheme, we give generic constru...
We propose the first tightly secure and unbounded hierarchical identity-based encryption (HIBE) sche...
We construct the first hierarchical identity-based encryption (HIBE) scheme with tight adaptive secu...
Hierarchical identity-based encryption (HIBE) is an extension of identity-based encryption (IBE) whe...
Hierarchical key-insulated identity-based encryption (HKIBE) is identity-based encryption (IBE) that...
Almost all existing hierarchical identity-based encryption (HIBE) schemes fully se-cure in the stand...
Proving security of Hierarchical Identity-Based Encryption (HIBE) and Attribution Based Encryption s...
Efficient and privacy-preserving constructions for search functionality on encrypted data is importa...
We prove that there is no fully black-box construction of collision-resistant hash functions (CRH) f...
We show a framework for constructing identity-based encryption (IBE) schemes that are (almost) tight...
Hierarchical identity-based encryption (HIBE) is a generalization of identity-based encryption (IBE)...
International audienceWe provide a generic transformation from any affine message authentication cod...
Abstract. We present two hierarchical identity-based encryption (HIBE) schemes, denoted as H1 and H2...
Abstract. We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext con...
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of j...
Starting with any selectively secure identity-based encryption (IBE) scheme, we give generic constru...
We propose the first tightly secure and unbounded hierarchical identity-based encryption (HIBE) sche...
We construct the first hierarchical identity-based encryption (HIBE) scheme with tight adaptive secu...
Hierarchical identity-based encryption (HIBE) is an extension of identity-based encryption (IBE) whe...
Hierarchical key-insulated identity-based encryption (HKIBE) is identity-based encryption (IBE) that...
Almost all existing hierarchical identity-based encryption (HIBE) schemes fully se-cure in the stand...
Proving security of Hierarchical Identity-Based Encryption (HIBE) and Attribution Based Encryption s...
Efficient and privacy-preserving constructions for search functionality on encrypted data is importa...
We prove that there is no fully black-box construction of collision-resistant hash functions (CRH) f...
We show a framework for constructing identity-based encryption (IBE) schemes that are (almost) tight...
Hierarchical identity-based encryption (HIBE) is a generalization of identity-based encryption (IBE)...
International audienceWe provide a generic transformation from any affine message authentication cod...
Abstract. We present two hierarchical identity-based encryption (HIBE) schemes, denoted as H1 and H2...
Abstract. We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext con...
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of j...
Starting with any selectively secure identity-based encryption (IBE) scheme, we give generic constru...