2021
DOI: 10.1007/s00145-021-09381-4
|View full text |Cite
|
Sign up to set email alerts
|

Match Me if You Can: Matchmaking Encryption and Its Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
50
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(50 citation statements)
references
References 67 publications
0
50
0
Order By: Relevance
“…Although above mentioned IBE schemes solve some issues in terms of public safety sharing requirements, they can not provide bilateral access control services for users with some particular needs. Ateniese et al [7] tackled this problem by constructing a matchmaking IBE (MIBE) scheme. MIBE scheme gives stronger privacy protection because it enables the sender to specify the identity of the receiver and ensures the receiver verifies the identity of the sender.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Although above mentioned IBE schemes solve some issues in terms of public safety sharing requirements, they can not provide bilateral access control services for users with some particular needs. Ateniese et al [7] tackled this problem by constructing a matchmaking IBE (MIBE) scheme. MIBE scheme gives stronger privacy protection because it enables the sender to specify the identity of the receiver and ensures the receiver verifies the identity of the sender.…”
Section: Related Workmentioning
confidence: 99%
“…In the present section, we will make a comparison to evaluate our proposed LMIBE scheme and partial existing IBE schemes based on lattices [25], [36], [37] with respect to communication and computation costs in theory. In addition, we also compare our scheme and other related schemes [7], [25], [36], [37] in respect of features of post-quantum and access control for the sender. We reveal the communication cost in Table 1 and the computation cost in Table 2 for our LMIBE scheme.…”
Section: Theoretical Evaluationmentioning
confidence: 99%
See 2 more Smart Citations
“…However, their scheme can only resist the known-plaintext attack, which is vulnerable to practical applications. To improve security, some task allocation schemes are proposed based on traditional cryptographic primitives, e.g., Yao's garble circuit [33], bilinear map [34], and Paillier cryptosystem [35]. For example, Yang et al [26] utilized the bilinear map to design a privacy-preserving task allocation scheme.…”
Section: Introductionmentioning
confidence: 99%