<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Cryptographic protocols / Identity-based cryptography / ID-based encryption / Functional encryption / Garbled circuit / Encryption / Secure multi-party computation / Attribute-based encryption / RSA / Chosen-ciphertext attack
Date: 2017-10-01 05:36:24
Cryptography
Public-key cryptography
Cryptographic protocols
Identity-based cryptography
ID-based encryption
Functional encryption
Garbled circuit
Encryption
Secure multi-party computation
Attribute-based encryption
RSA
Chosen-ciphertext attack

Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions Zvika Brakerski∗ Alex Lombardi†

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 600,00 KB

Share Document on Facebook

Similar Documents

Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography Aniket Kate Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo

DocID: 1sYnO - View Document

Cryptography / Public-key cryptography / Identity-based cryptography / Elliptic curve cryptography / Dan Boneh / ID-based encryption / Association for Computing Machinery / Pairing-based cryptography / Boneh / Infosys / ID-based cryptography / Computer science

EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

DocID: 1rn34 - View Document

Cryptography / Public-key cryptography / Zero-knowledge proof / ID-based encryption / Cryptographic protocol / ID-based cryptography / Authentication / Digital signature / FeigeFiatShamir identification scheme

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

DocID: 1qZ4T - View Document

Cryptography / Public-key cryptography / Attribute-based encryption / Encryption / ID-based encryption / Personal health record / RSA / Key / Cipher / Data Encryption Standard / Cloud computing security / Identity-based conditional proxy re-encryption

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1qQ53 - View Document

Cryptography / Computer security / Computer access control / Identity management / Public-key cryptography / Federated identity / Cryptographic protocols / Digital credential / Authentication / Credential / Multi-factor authentication / Access control

Concepts and Languages for Privacy-Preserving Attribute-Based AuthenticationI,II Jan Camenischa,∗, Maria Dubovitskayaa,b , Robert R. Enderleina,b,∗∗, Anja Lehmanna , Gregory Nevena , Christian Paquinc , Franz-Stefa

DocID: 1qibv - View Document