The following publications are possibly variants of this publication:
- On Tightly Secure Primitives in the Multi-instance SettingDennis Hofheinz, Ngoc Khanh Nguyen 0001. pkc 2019: 581-611 [doi]
- Tightly CCA-secure encryption scheme in a multi-user setting with corruptionsYoungkyung Lee, Dong Hoon Lee 0001, Jong Hwan Park. dcc, 88(11):2433-2452, 2020. [doi]
- Tightly Secure Chameleon Hash Functions in the Multi-User Setting and Their ApplicationsXiangyu Liu, Shengli Liu 0001, Dawu Gu. iacr, 2022:1258, 2022. [doi]
- Tight security for the generic construction of identity-based signature (in the multi-instance setting)Youngkyung Lee, Jong Hwan Park, Kwangsu Lee, Dong Hoon Lee 0001. TCS, 847:122-133, 2020. [doi]
- Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext SettingDennis Hofheinz, Jessica Koch, Christoph Striecks. pkc 2015: 799-822 [doi]
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext settingDennis Hofheinz, Jessica Koch, Christoph Striecks. iacr, 2015:123, 2015. [doi]
- Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext SettingDennis Hofheinz, Jessica Koch, Christoph Striecks. joc, 37(2):12, June 2024. [doi]