Abstract. Identity-based encryption (IBE) is a special case of public-key encryption where user identities replace public keys. Every user is given a corresponding secret key for decryp-tion, and encryptions for his or her identity must remain confidential even to attackers who learn the secret keys associated with other identities. Several IBE constructions are known to date, but their security relies on specific assumptions, such as quadratic residuosity, as well as different pairing-based and lattice-based assumptions. To circumvent the lack of generic constructions, Dodis et al. (EUROCRYPT ’02) introduced the notion of bounded-collusion IBE (BC-IBE), where attackers only learn secret keys of an a-priori bounded number t of identities. T...
Recently, Döttling and Garg (CRYPTO 2017) showed how to build identity-based encryption (IBE) from a...
Abstract. Identity Based Encryption (IBE) has been constructed from bilinear pairings, lattices and ...
Identity based encryption (IBE) schemes have been flourishing since the very beginning of this cent...
Abstract. In this work, we show how to construct IBE schemes that are secure against a bounded numbe...
In this work, we show how to construct IBE schemes that are secure against a bounded number of collu...
In this paper, we present a variant of Waters\u27 Identity-Based Encryption scheme with a much small...
We ask whether an Identity Based Encryption (IBE) sys-tem can be built from simpler public-key primi...
We propose a generic construction that yields efficient identity-based encryption (IBE) schemes secu...
We show a framework for constructing identity-based encryption (IBE) schemes that are (almost) tight...
Abstract. Identity Based Encryption (IBE) has attracted a lot of attention since the publication of ...
Abstract. Security against selective opening attack (SOA) requires that in a multi-user setting, eve...
Abstract. Identity Based Encryption (IBE) has attracted a lot of attention since the publication of ...
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...
Abstract. Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography...
Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbit...
Recently, Döttling and Garg (CRYPTO 2017) showed how to build identity-based encryption (IBE) from a...
Abstract. Identity Based Encryption (IBE) has been constructed from bilinear pairings, lattices and ...
Identity based encryption (IBE) schemes have been flourishing since the very beginning of this cent...
Abstract. In this work, we show how to construct IBE schemes that are secure against a bounded numbe...
In this work, we show how to construct IBE schemes that are secure against a bounded number of collu...
In this paper, we present a variant of Waters\u27 Identity-Based Encryption scheme with a much small...
We ask whether an Identity Based Encryption (IBE) sys-tem can be built from simpler public-key primi...
We propose a generic construction that yields efficient identity-based encryption (IBE) schemes secu...
We show a framework for constructing identity-based encryption (IBE) schemes that are (almost) tight...
Abstract. Identity Based Encryption (IBE) has attracted a lot of attention since the publication of ...
Abstract. Security against selective opening attack (SOA) requires that in a multi-user setting, eve...
Abstract. Identity Based Encryption (IBE) has attracted a lot of attention since the publication of ...
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...
Abstract. Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography...
Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbit...
Recently, Döttling and Garg (CRYPTO 2017) showed how to build identity-based encryption (IBE) from a...
Abstract. Identity Based Encryption (IBE) has been constructed from bilinear pairings, lattices and ...
Identity based encryption (IBE) schemes have been flourishing since the very beginning of this cent...