Efficient CCA-Secure PKE from Identity-Based Techniques
Boneh, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure public key encryption (PKE) from any selective-ID CPA-secure identity-based encryption (IBE) schemes. Their approach treated IBE as a black box. Subsequently, Boyen, Mei, and Waters demonstrated how to build a direc...
Saved in:
Main Authors: | LAI, Junzuo, DENG, Robert H., LIU, Shengli, KOU, Weidong |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2010
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/634 https://ink.library.smu.edu.sg/context/sis_research/article/1633/viewcontent/Lai2010_Chapter_EfficientCCA_SecurePKEFromIden.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
CCA-secure keyed-fully homomorphic encryption
by: LAI, Junzuo, et al.
Published: (2016) -
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
by: Lai, Junzuo, et al.
Published: (2014) -
New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
by: LAI, Junzuo, et al.
Published: (2010) -
Cryptanalysis of a Hierarchical Identity-based Encryption Scheme
by: WENG, Jian, et al.
Published: (2010) -
Generic anonymous identity-based broadcast encryption with chosen-ciphertext security
by: HE, Kai, et al.
Published: (2016)