Jin, Renjie; Qu, Longjiang; Chen, Rongmao; Yang, Zhichao; Wang, Yi A lattice-based forward secure IBE scheme for Internet of things. (English) Zbl 07821773 Inf. Sci. 660, Article ID 120083, 12 p. (2024). MSC: 68M11 PDFBibTeX XMLCite \textit{R. Jin} et al., Inf. Sci. 660, Article ID 120083, 12 p. (2024; Zbl 07821773) Full Text: DOI
Hohenberger, Susan; Lu, George; Waters, Brent; Wu, David J. Registered attribute-based encryption. (English) Zbl 1528.94058 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14006, 511-542 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Hohenberger} et al., Lect. Notes Comput. Sci. 14006, 511--542 (2023; Zbl 1528.94058) Full Text: DOI
Proulx, Pierre-Luc Dostie; Guillermin, Mathieu The role of explanatory virtues in abduction and IBE. (English) Zbl 07740527 Béziau, Jean-Yves (ed.) et al., Logic in question. Talks from the annual Sorbonne logic workshop (2011–2019), Paris, France, April 15–16, 2019. Cham: Birkhäuser. Stud. Univers. Log., 471-490 (2022). MSC: 03A05 03Bxx 01A25 01A55 00A30 03A10 PDFBibTeX XMLCite \textit{P.-L. D. Proulx} and \textit{M. Guillermin}, in: Logic in question. Talks from the annual Sorbonne logic workshop (2011--2019), Paris, France, April 15--16, 2019. Cham: Birkhäuser. 471--490 (2022; Zbl 07740527) Full Text: DOI
Ali, Syed Taqi Extensions of IBE and related primitives. (English) Zbl 1504.94090 Bin Ahmad, Khairol Amali (ed.) et al., Functional encryption. Cham: Springer. EAI/Springer Innov. Commun. Comput., 205-224 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{S. T. Ali}, in: Functional encryption. Cham: Springer. 205--224 (2021; Zbl 1504.94090) Full Text: DOI
Mutaher, Hamza; Hodeish, Mahmoud E. Sakai-Kasahara IBE. (English) Zbl 1504.94175 Bin Ahmad, Khairol Amali (ed.) et al., Functional encryption. Cham: Springer. EAI/Springer Innov. Commun. Comput., 171-185 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Mutaher} and \textit{M. E. Hodeish}, in: Functional encryption. Cham: Springer. 171--185 (2021; Zbl 1504.94175) Full Text: DOI
Sharma, Deepak Kumar; Tokas, Bhanu; Jakkinapalli, Venkata Rohit; Nagpal, Ritvik Boneh-Franklin IBE. (English) Zbl 1504.94187 Bin Ahmad, Khairol Amali (ed.) et al., Functional encryption. Cham: Springer. EAI/Springer Innov. Commun. Comput., 137-149 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{D. K. Sharma} et al., in: Functional encryption. Cham: Springer. 137--149 (2021; Zbl 1504.94187) Full Text: DOI
Sharma, Deepak Kumar; Tokas, Bhanu; Jakkinapalli, Venkata Rohit; Nagpal, Ritvik Cocks IBE scheme. (English) Zbl 1504.94186 Bin Ahmad, Khairol Amali (ed.) et al., Functional encryption. Cham: Springer. EAI/Springer Innov. Commun. Comput., 117-136 (2021). MSC: 94A60 11T06 PDFBibTeX XMLCite \textit{D. K. Sharma} et al., in: Functional encryption. Cham: Springer. 117--136 (2021; Zbl 1504.94186) Full Text: DOI
Ma, Xuecheng; Lin, Dongdai Generic constructions of revocable identity-based encryption. (English) Zbl 1499.94047 Liu, Zhe (ed.) et al., Information security and cryptology. 15th international conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12020, 381-396 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Ma} and \textit{D. Lin}, Lect. Notes Comput. Sci. 12020, 381--396 (2020; Zbl 1499.94047) Full Text: DOI
Farshim, Pooya; Fuchsbauer, Georg; Passelègue, Alain Simpler constructions of asymmetric primitives from obfuscation. (English) Zbl 1492.94104 Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 715-738 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Farshim} et al., Lect. Notes Comput. Sci. 12578, 715--738 (2020; Zbl 1492.94104) Full Text: DOI
Garg, Sanjam; Hajiabadi, Mohammad; Mahmoody, Mohammad; Rahimi, Ahmadreza Registration-based encryption: removing private-key generator from IBE. (English) Zbl 1443.94057 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 689-718 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 11239, 689--718 (2018; Zbl 1443.94057) Full Text: DOI
Gong, Junqing; Libert, Benoît; Ramanna, Somindu C. Compact IBBE and fuzzy IBE from simple assumptions. (English) Zbl 1517.94103 Catalano, Dario (ed.) et al., Security and cryptography for networks. 11th international conference, SCN 2018, Amalfi, Italy, September 5–7, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11035, 563-582 (2018). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Gong} et al., Lect. Notes Comput. Sci. 11035, 563--582 (2018; Zbl 1517.94103) Full Text: DOI HAL
Ma, Xuecheng; Wang, Xin; Lin, Dongdai Anonymous identity-based encryption with identity recovery. (English) Zbl 1444.94090 Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 360-375 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Ma} et al., Lect. Notes Comput. Sci. 10946, 360--375 (2018; Zbl 1444.94090) Full Text: DOI arXiv
Brakerski, Zvika; Lombardi, Alex; Segev, Gil; Vaikuntanathan, Vinod Anonymous IBE, leakage resilience and circular security from new assumptions. (English) Zbl 1423.94056 Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10820, 535-564 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Brakerski} et al., Lect. Notes Comput. Sci. 10820, 535--564 (2018; Zbl 1423.94056) Full Text: DOI Link
Bert, Pauline; Fouque, Pierre-Alain; Roux-Langlois, Adeline; Sabt, Mohamed Practical implementation of Ring-SIS/LWE based signature and IBE. (English) Zbl 1425.94048 Lange, Tanja (ed.) et al., Post-quantum cryptography. 9th international conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9–11, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10786, 271-291 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Bert} et al., Lect. Notes Comput. Sci. 10786, 271--291 (2018; Zbl 1425.94048) Full Text: DOI HAL
Cabrera, Frank Can there be a Bayesian explanationism? On the prospects of a productive partnership. (English) Zbl 1417.03112 Synthese 194, No. 4, 1245-1272 (2017). MSC: 03A10 60A05 62A01 PDFBibTeX XMLCite \textit{F. Cabrera}, Synthese 194, No. 4, 1245--1272 (2017; Zbl 1417.03112) Full Text: DOI Link
Jutla, Charanjit S.; Roy, Arnab Shorter quasi-adaptive NIZK proofs for linear subspaces. (English) Zbl 1386.94078 J. Cryptology 30, No. 4, 1116-1156 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{C. S. Jutla} and \textit{A. Roy}, J. Cryptology 30, No. 4, 1116--1156 (2017; Zbl 1386.94078) Full Text: DOI
Gaborit, Philippe; Hauteville, Adrien; Phan, Duong Hieu; Tillich, Jean-Pierre Identity-based encryption from codes with rank metric. (English) Zbl 1390.94834 Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part III. Cham: Springer (ISBN 978-3-319-63696-2/pbk; 978-3-319-63697-9/ebook). Lecture Notes in Computer Science 10403, 194-224 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Gaborit} et al., Lect. Notes Comput. Sci. 10403, 194--224 (2017; Zbl 1390.94834) Full Text: DOI HAL
Wee, Hoeteck Déjà Q: encore! Un petit IBE. (English) Zbl 1377.94067 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 237-258 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Wee}, Lect. Notes Comput. Sci. 9563, 237--258 (2016; Zbl 1377.94067) Full Text: DOI
Kiayias, Aggelos; Tang, Qiang Making any identity-based encryption accountable, efficiently. (English) Zbl 1504.94160 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 326-346 (2015). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{A. Kiayias} and \textit{Q. Tang}, Lect. Notes Comput. Sci. 9326, 326--346 (2015; Zbl 1504.94160) Full Text: DOI
Qin, Baodong; Deng, Robert H.; Li, Yingjiu; Liu, Shengli Server-aided revocable identity-based encryption. (English) Zbl 1499.68057 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 286-304 (2015). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{B. Qin} et al., Lect. Notes Comput. Sci. 9326, 286--304 (2015; Zbl 1499.68057) Full Text: DOI
Zhandry, Mark Secure identity-based encryption in the quantum random oracle model. (English) Zbl 1327.81178 Int. J. Quantum Inf. 13, No. 4, Article ID 1550014, 31 p. (2015). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{M. Zhandry}, Int. J. Quantum Inf. 13, No. 4, Article ID 1550014, 31 p. (2015; Zbl 1327.81178)
Jiang, Mingming; Hu, Yupu; Lei, Hao; Wang, Baocang; Lai, Qiqi Lattice-based certificateless encryption scheme. (English) Zbl 1404.94082 Front. Comput. Sci. 8, No. 5, 828-836 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. Jiang} et al., Front. Comput. Sci. 8, No. 5, 828--836 (2014; Zbl 1404.94082) Full Text: DOI
Li, Tongchun; Liu, Xiaoqing; Zhao, Lanhao An interactive method of interface boundary elements and partitioned finite elements for local continuous/discontinuous deformation problems. (English) Zbl 1352.74466 Int. J. Numer. Methods Eng. 100, No. 7, 534-554 (2014). MSC: 74S15 74S05 65N30 65N38 PDFBibTeX XMLCite \textit{T. Li} et al., Int. J. Numer. Methods Eng. 100, No. 7, 534--554 (2014; Zbl 1352.74466) Full Text: DOI
Jutla, Charanjit S.; Roy, Arnab Switching lemma for bilinear tests and constant-size NIZK proofs for linear subspaces. (English) Zbl 1335.94057 Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 295-312 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. S. Jutla} and \textit{A. Roy}, Lect. Notes Comput. Sci. 8617, 295--312 (2014; Zbl 1335.94057) Full Text: DOI
Blazy, Olivier; Kiltz, Eike; Pan, Jiaxin (Hierarchical) identity-based encryption from affine message authentication. (English) Zbl 1345.94044 Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 408-425 (2014). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{O. Blazy} et al., Lect. Notes Comput. Sci. 8616, 408--425 (2014; Zbl 1345.94044) Full Text: DOI
Clear, Michael; Tewari, Hitesh; McGoldrick, Ciarán Anonymous IBE from quadratic residuosity with improved performance. (English) Zbl 1318.94063 Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 377-397 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Clear} et al., Lect. Notes Comput. Sci. 8469, 377--397 (2014; Zbl 1318.94063) Full Text: DOI
Tohmé, Fernando; Crespo, Ricardo Abduction in economics: a conceptual framework and its model. (English) Zbl 1302.91171 Synthese 190, No. 18, 4215-4237 (2013). MSC: 91B99 03A10 PDFBibTeX XMLCite \textit{F. Tohmé} and \textit{R. Crespo}, Synthese 190, No. 18, 4215--4237 (2013; Zbl 1302.91171) Full Text: DOI
Kurosawa, Kaoru; Le Trieu Phong Leakage resilient IBE and IPE under the DLIN assumption. (English) Zbl 1356.94067 Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 487-501 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{Le Trieu Phong}, Lect. Notes Comput. Sci. 7954, 487--501 (2013; Zbl 1356.94067) Full Text: DOI
Ramanna, Somindu C.; Sarkar, Palash Anonymous constant-size ciphertext HIBE from asymmetric pairings. (English) Zbl 1317.94132 Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 344-363 (2013). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. C. Ramanna} and \textit{P. Sarkar}, Lect. Notes Comput. Sci. 8308, 344--363 (2013; Zbl 1317.94132) Full Text: DOI
Jutla, Charanjit S.; Roy, Arnab Shorter quasi-adaptive NIZK proofs for linear subspaces. (English) Zbl 1300.94072 Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 1-20 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{C. S. Jutla} and \textit{A. Roy}, Lect. Notes Comput. Sci. 8269, 1--20 (2013; Zbl 1300.94072) Full Text: DOI
Sarkar, Palash; Chatterjee, Sanjit Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption. (English) Zbl 1307.94092 Int. J. Appl. Cryptogr. 3, No. 1, 47-83 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Sarkar} and \textit{S. Chatterjee}, Int. J. Appl. Cryptogr. 3, No. 1, 47--83 (2013; Zbl 1307.94092) Full Text: DOI
Staamann, Sebastian An identity-based key-encapsulation mechanism built on identity-based factors selection. (English) Zbl 1312.94094 Youssef, Amr (ed.) et al., Progress in cryptology – AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 392-405 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Staamann}, Lect. Notes Comput. Sci. 7918, 392--405 (2013; Zbl 1312.94094) Full Text: DOI
Akavia, Adi; Goldwasser, Shafi; Hazay, Carmit Distributed public key schemes secure against continual leakage. (English) Zbl 1301.94103 Proceedings of the 2012 ACM symposium on principles of distributed computing, PODC ’12, Funchal, Portugal, July 16–18, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1450-3). 155-164 (2012). MSC: 94A60 68M12 68M14 PDFBibTeX XMLCite \textit{A. Akavia} et al., in: Proceedings of the 31st ACM symposium on principles of distributed computing, PODC '12, Funchal, Portugal, July 16--18, 2012. New York, NY: Association for Computing Machinery (ACM). 155--164 (2012; Zbl 1301.94103) Full Text: DOI Link
Zhandry, Mark Secure identity-based encryption in the quantum random oracle model. (English) Zbl 1296.94147 Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 758-775 (2012). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Zhandry}, Lect. Notes Comput. Sci. 7417, 758--775 (2012; Zbl 1296.94147) Full Text: DOI
Fazio, Nelly; Perera, Irippuge Milinda Outsider-anonymous broadcast encryption with sublinear ciphertexts. (English) Zbl 1290.94071 Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 225-242 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Fazio} and \textit{I. M. Perera}, Lect. Notes Comput. Sci. 7293, 225--242 (2012; Zbl 1290.94071) Full Text: DOI
Algehawi, Mohammed Benasser; Samsudin, Azman A new identity based encryption (IBE) scheme using extended Chebyshev polynomial over finite fields \(Z_p\). (English) Zbl 1238.94026 Phys. Lett., A 374, No. 46, 4670-4674 (2010). MSC: 94A60 41A50 PDFBibTeX XMLCite \textit{M. B. Algehawi} and \textit{A. Samsudin}, Phys. Lett., A 374, No. 46, 4670--4674 (2010; Zbl 1238.94026) Full Text: DOI
Cheung, David W.; Mamoulis, Nikos; Wong, W. K.; Yiu, S. M.; Zhang, Ye Anonymous fuzzy identity-based encryption for similarity search. (English) Zbl 1311.94074 Cheong, Otfried (ed.) et al., Algorithms and computation. 21st international symposium, ISAAC 2010, Jeju Island, Korea, December 15–17, 2010. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-17516-9/pbk). Lecture Notes in Computer Science 6506, 61-72 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{D. W. Cheung} et al., Lect. Notes Comput. Sci. 6506, 61--72 (2010; Zbl 1311.94074) Full Text: DOI
Lin, Huang; Cao, Zhenfu; Liang, Xiaohui; Zhou, Muxin; Zhu, Haojin; Xing, Dongsheng How to construct interval encryption from binary tree encryption. (English) Zbl 1315.94085 Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 19-34 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Lin} et al., Lect. Notes Comput. Sci. 6123, 19--34 (2010; Zbl 1315.94085) Full Text: DOI
Agrawal, Shweta; Boneh, Dan; Boyen, Xavier Efficient lattice (H)IBE in the standard model. (English) Zbl 1227.94022 Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 553-572 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Agrawal} et al., Lect. Notes Comput. Sci. 6110, 553--572 (2010; Zbl 1227.94022) Full Text: DOI
Chevallier-Mames, Benoît; Coron, Jean-Sébastien; McCullagh, Noel; Naccache, David; Scott, Michael Secure delegation of elliptic-curve pairing. (English) Zbl 1391.94738 Gollmann, Dieter (ed.) et al., Smart card research and advanced application. 9th IFIP WG 8.8/11.2 international conference, CARDIS 2010, Passau, Germany, April 14–16, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12509-6/pbk). Lecture Notes in Computer Science 6035, 24-35 (2010). MSC: 94A60 14G50 PDFBibTeX XML Full Text: DOI
Boyen, Xavier Generalized IBE in the exponent-inversion framework. (English) Zbl 1159.68433 Joye, Marc (ed.) et al., Identity-based cryptography. Amsterdam: IOP Press (ISBN 978-1-58603-947-9/hbk). Cryptology and Information Security Series 2, 83-99 (2009). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{X. Boyen}, in: Identity-based cryptography. Amsterdam: IOP Press. 83--99 (2009; Zbl 1159.68433)
Fang, Li-Ming; Wang, Jian-Dong; Ren, Yong-Jun; Xia, Jin-Yue; Bian, Shi-Zhu Chosen ciphertext secure fuzzy identity based encryption without ROM. (English) Zbl 1229.94043 J. Shanghai Jiaotong Univ., Sci. 13, No. 6, 646-650 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{L.-M. Fang} et al., J. Shanghai Jiaotong Univ., Sci. 13, No. 6, 646--650 (2008; Zbl 1229.94043) Full Text: DOI
Baek, Joonsang; Susilo, Willy; Zhou, Jianying Fuzzy identity-based encryption: new and efficient schemes. (English) Zbl 1156.94332 Li, Yongqing (ed.) et al., Coding and cryptology. Proceedings of the first international workshop, Wuyi Mountain, Fujian, China, June 11–15, 2007. Hackensack, NJ: World Scientific (ISBN 978-981-283-223-8/hbk). Series on Coding Theory and Cryptology 4, 1-14 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Baek} et al., Ser. Coding Theory Cryptol. 4, 1--14 (2008; Zbl 1156.94332) Full Text: DOI
Paterson, Kenneth G.; Srinivasan, Sriramkrishnan Security and anonymity of identity-based encryption with multiple trusted authorities. (English) Zbl 1186.94465 Galbraith, Steven D. (ed.) et al., Pairing-based cryptography – Pairing 2008. Second international conference, Egham, UK, September 1–3, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85503-3/pbk). Lecture Notes in Computer Science 5209, 354-375 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{S. Srinivasan}, Lect. Notes Comput. Sci. 5209, 354--375 (2008; Zbl 1186.94465) Full Text: DOI
Boyen, Xavier A tapestry of identity-based encryption: practical frameworks compared. (English) Zbl 1178.94001 Int. J. Appl. Cryptogr. 1, No. 1, 3-21 (2008). MSC: 94-02 94A60 68P25 PDFBibTeX XMLCite \textit{X. Boyen}, Int. J. Appl. Cryptogr. 1, No. 1, 3--21 (2008; Zbl 1178.94001) Full Text: DOI
Zhang, Rui; Imai, Hideki Improvements on security proofs of some identity based encryption schemes. (English) Zbl 1151.94636 Feng, Dengguo (ed.) et al., Information security and cryptology. First SKLOIS conference, CISC 2005, Beijing, China, December 15–17, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30855-5/pbk). Lecture Notes in Computer Science 3822, 28-41 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Zhang} and \textit{H. Imai}, Lect. Notes Comput. Sci. 3822, 28--41 (2005; Zbl 1151.94636) Full Text: DOI