Partitioning via non-linear polynomial functions: more compact IBEs from ideal lattices and bilinear maps

S Katsumata, S Yamada - … 2016: 22nd International Conference on the …, 2016 - Springer
In this paper, we present new adaptively secure identity-based encryption (IBE) schemes.
One of the distinguishing properties of the schemes is that it achieves shorter public …

Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques

S Yamada - Advances in Cryptology–CRYPTO 2017: 37th Annual …, 2017 - Springer
In this paper, we focus on the constructions of adaptively secure identity-based encryption
(IBE) from lattices and verifiable random function (VRF) with large input spaces. Existing …

Towards tightly secure lattice short signature and id-based encryption

X Boyen, Q Li - International Conference on the Theory and …, 2016 - Springer
Constructing short signatures with tight security from standard assumptions is a long-
standing open problem. We present an adaptively secure, short (and stateless) signature …

Programmable hash functions from lattices: short signatures and IBEs with small key sizes

J Zhang, Y Chen, Z Zhang - Annual international cryptology conference, 2016 - Springer
Driven by the open problem raised by Hofheinz and Kiltz 34, we study the formalization of
lattice-based programmable hash function (PHF), and give two types of constructions by …

Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance

A Takayasu, Y Watanabe - … , ACISP 2017, Auckland, New Zealand, July 3 …, 2017 - Springer
A revocable identity-based encryption (RIBE) scheme, proposed by Boldyreva et al.,
provides a revocation functionality for managing a number of users dynamically and …

Generic constructions of revocable identity-based encryption

X Ma, D Lin - Information Security and Cryptology: 15th International …, 2020 - Springer
Revocable identity-based encryption (RIBE) is an extension of IBE which can support a key
revocation mechanism, and it is important when deploying an IBE system in practice. Boneh …

A practical implementation of identity-based encryption over NTRU lattices

S McCarthy, N Smyth, E O'Sullivan - … 2017, Oxford, UK, December 12-14 …, 2017 - Springer
An identity-based encryption scheme enables the efficient distribution of keys in a multi-user
system. Such schemes are particularly attractive in resource constrained environments …

A practical study of post-quantum enhanced identity-based encryption

D Verchyk, J Sepúlveda - Microprocessors and Microsystems, 2023 - Elsevier
One of the most expensive processes inside Public-Key Infrastructure (PKI) is certificate
management. Identity-based Encryption (IBE) is seen as an alternative to alleviate the …

Towards compact identity-based encryption on ideal lattices

H Jia, Y Hu, C Tang, L Wang - Cryptographers' Track at the RSA …, 2024 - Springer
Basic encryption and signature on lattices have comparable efficiency to their classical
counterparts in terms of speed and key size. However, Identity-based Encryption (IBE) on …

Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance

T Jager, R Kurek, D Niehues - IACR International Conference on Public …, 2021 - Springer
We construct more efficient cryptosystems with provable security against adaptive attacks,
based on simple and natural hardness assumptions in the standard model. Concretely, we …