Abstract. Identity-based encryption is a very convenient tool to avoid key management. Recipient-privacy is also a major concern nowadays. To combine both, anonymous identity-based encryption has been proposed. This paper extends this notion to stronger adversaries (the authority itself). We discuss this new notion, together with a new kind of non-malleability with respect to the identity, for several existing schemes. Inter-estingly enough, such a new anonymity property has an independent application to password-authenticated key exchange. We thus come up with a new generic framework for password-authenticated key exchange, and a concrete construction based on pairings.
Abstract. Identity Based Encryption (IBE) has attracted a lot of attention since the publication of ...
Abstract. Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography...
In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for ...
The original publication is available at www.springerlink.comInternational audienceIdentity-based en...
The original publication is available at www.springerlink.comIdentity-based encryption is a very con...
Abstract. In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is respon...
Anonymity and authenticity are both important yet often conflicting security goals in a wide range o...
Anonymity and authenticity are both important yet often conflicting security goals in a wide range o...
Abstract. Anonymity and authenticity are both important yet often conflicting security goals in a wi...
Common key agreement protocols assume that both parties have some knowledge of each others identity ...
Common key agreement protocols assume that both parties have some knowledge of each others identity ...
An identity-based encryption (IBE) scheme is called anonymous if the ciphertext leaks no information...
[[abstract]]In 2010, Fan et al. proposed an efficient anonymous multi-receiver identity-based encryp...
Because of the growing importance in the fields of computer networks, how to keep user's privacy has...
Abstract. Identity Based Encryption (IBE) has attracted a lot of attention since the publication of ...
Abstract. Identity Based Encryption (IBE) has attracted a lot of attention since the publication of ...
Abstract. Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography...
In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for ...
The original publication is available at www.springerlink.comInternational audienceIdentity-based en...
The original publication is available at www.springerlink.comIdentity-based encryption is a very con...
Abstract. In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is respon...
Anonymity and authenticity are both important yet often conflicting security goals in a wide range o...
Anonymity and authenticity are both important yet often conflicting security goals in a wide range o...
Abstract. Anonymity and authenticity are both important yet often conflicting security goals in a wi...
Common key agreement protocols assume that both parties have some knowledge of each others identity ...
Common key agreement protocols assume that both parties have some knowledge of each others identity ...
An identity-based encryption (IBE) scheme is called anonymous if the ciphertext leaks no information...
[[abstract]]In 2010, Fan et al. proposed an efficient anonymous multi-receiver identity-based encryp...
Because of the growing importance in the fields of computer networks, how to keep user's privacy has...
Abstract. Identity Based Encryption (IBE) has attracted a lot of attention since the publication of ...
Abstract. Identity Based Encryption (IBE) has attracted a lot of attention since the publication of ...
Abstract. Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography...
In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for ...