Novel construction of forward-secure public-key encryption in the standard model

被引:0
|
作者
机构
[1] Lu, Yang
[2] Li, Ji-Guo
来源
Lu, Y. | 1600年 / Editorial Board of Journal on Communications卷 / 35期
关键词
D O I
10.3969/j.issn.1000-436x.2014.02.005
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] A brief history of provably-secure public-key encryption
    Dent, Alexander W.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 357 - 370
  • [42] Secure Public-Key Encryption from Random Oracle Transformation
    Nishioka, Mototsugu
    Komatsu, Naohisa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (04) : 1091 - 1105
  • [43] A simpler construction of CCA2-secure public-key encryption under general assumptions
    Lindell, Y
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 241 - 254
  • [44] A Practical Quantum Public-key Encryption Model
    Wang, Yuqi
    She, Kun
    2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), 2017, : 367 - 372
  • [46] A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions
    Yehuda Lindell
    Journal of Cryptology, 2006, 19 : 359 - 377
  • [47] Forward-secure ID based digital signature scheme with forward-secure private key generator
    Oh, Hyunok
    Kim, Jihye
    Shin, Ji Sun
    INFORMATION SCIENCES, 2018, 454 : 96 - 109
  • [48] Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption
    Hayata, Junichiro
    Ishizaka, Masahito
    Sakai, Yusuke
    Hanaoka, Goichiro
    Matsuura, Kanta
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 107 - 113
  • [49] Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption
    Hayata, Jun'ichiro
    Ishizaka, Masahito
    Sakai, Yusuke
    Hanaoka, Goichiro
    Matsuura, Kanta
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 707 - 711
  • [50] New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability
    Weng, Zhiwei
    Weng, Jian
    He, Kai
    Li, Yingkai
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2012, 6839 : 170 - 176