Keyword : tight security reduction


A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption
Kaisei KAJITA Kazuto OGAWA Eiichiro FUJISAKI 
Publication:   
Publication Date: 2020/01/01
Vol. E103-A  No. 1 ; pp. 141-149
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
digital signatureCDH assumptiontrapdoor commitmenttight security reduction
 Summary | Full Text:PDF(1MB)

New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security
Nuttapong ATTRAPADUNG Goichiro HANAOKA Shota YAMADA 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9 ; pp. 1882-1890
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
Boneh-Boyen identity-based encryptiontight security reductionmulti-challenge security
 Summary | Full Text:PDF(1.1MB)

Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced from the Decisional Linear Assumption
Tatsuaki OKAMOTO Katsuyuki TAKASHIMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1 ; pp. 42-52
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Protocols
Keyword: 
functional encryptioninner-product encryptionattribute-hidingtight security reductionshort ciphertexts/secret-keys
 Summary | Full Text:PDF(310.4KB)

Practical Hierarchical Identity Based Encryption Scheme without Random Oracles
Xiaoming HU Shangteng HUANG Xun FAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/06/01
Vol. E92-A  No. 6 ; pp. 1494-1499
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
cryptanalysishierarchical identity-based encryptionconstant size ciphertexttight security reduction
 Summary | Full Text:PDF(112.6KB)

Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong ATTRAPADUNG Jun FURUKAWA Takeshi GOMI Goichiro HANAOKA Hideki IMAI Rui ZHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9 ; pp. 1803-1813
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
identity based encryptiontight security reduction
 Summary | Full Text:PDF(341.8KB)