Direct chosen ciphertext security from identity-based techniques
- 7 November 2005
- proceedings article
- Published by Association for Computing Machinery (ACM)
- Vol. 1592, 320-329
- https://doi.org/10.1145/1102120.1102162
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEMLecture Notes in Computer Science, 2005
- Efficient Identity-Based Encryption Without Random OraclesLecture Notes in Computer Science, 2005
- Hierarchical Identity Based Encryption with Constant Size CiphertextLecture Notes in Computer Science, 2005
- The Weil Pairing, and Its Efficient CalculationJournal of Cryptology, 2004
- A One Round Protocol for Tripartite Diffie–HellmanJournal of Cryptology, 2004
- A New Paradigm of Hybrid Encryption SchemeLecture Notes in Computer Science, 2004
- Efficient Selective-ID Secure Identity-Based Encryption Without Random OraclesLecture Notes in Computer Science, 2004
- Chosen-Ciphertext Security from Identity-Based EncryptionLecture Notes in Computer Science, 2004
- Using Hash Functions as a Hedge against Chosen Ciphertext AttackLecture Notes in Computer Science, 2000
- Public-key cryptosystems provably secure against chosen ciphertext attacksPublished by Association for Computing Machinery (ACM) ,1990