CCA-Secure Deterministic Identity-Based Encryption Scheme
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involving any randomness, was introduced by Bellare, Boldyreva, and O'Neill (CRYPTO 2007) as a realistic alternative to some inherent drawbacks in randomized public-key encryption. Bellare, Kiltz, Peike...
Main Authors: | Meijuan Huang, Bo Yang, Yi Zhao, Kaitai Liang, Liang Xue, Xiaoyi Yang |
---|---|
Format: | Article |
Language: | English |
Published: |
Graz University of Technology
2019-03-01
|
Series: | Journal of Universal Computer Science |
Subjects: | |
Online Access: | https://lib.jucs.org/article/22596/download/pdf/ |
Similar Items
-
Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes
by: Linming Gong, et al.
Published: (2019-01-01) -
Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security
by: Chun-I Fan, et al.
Published: (2015-10-01) -
CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud
by: Yinxia Sun, et al.
Published: (2018-01-01) -
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption
by: Yi-Fan Tseng, et al.
Published: (2019-03-01) -
Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes
by: Tongchen Shen, et al.
Published: (2019-01-01)