Bounded-Collusion IBE from Key Homomorphism
In this work, we show how to construct IBE schemes that are secure against a bounded number of collusions, starting with underlying PKE schemes which possess linear homomorphisms over their keys. In particular, this enables us to exhibit a new (bounded-collusion) IBE construction based on the quadra...
Main Authors: | Goldwasser, Shafi (Contributor), Lewko, Allison (Author), Wilson, David A. (Contributor) |
---|---|
Other Authors: | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory (Contributor), Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science (Contributor) |
Format: | Article |
Language: | English |
Published: |
Springer-Verlag,
2014-05-05T19:24:01Z.
|
Subjects: | |
Online Access: | Get fulltext |
Similar Items
-
A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing
by: Juyan Li, et al.
Published: (2021-01-01) -
An Efficient Lattice-based Distributed IBE
by: Yin Lu, et al.
Published: (2016-01-01) -
Lattice Trapdoors and IBE from Middle-Product LWE
by: Lombardi, Alex, et al.
Published: (2021) -
BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys
by: Songjie Wei, et al.
Published: (2018-01-01) -
Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions
by: Brakerski, Zvika, et al.
Published: (2021)