Abstract. Identity Based Encryption (IBE) has been constructed from bilinear pairings, lattices and quadratic residuosity. The latter is an attractive basis for an IBE owing to the fact that it is a well-understood hard problem from number theory. Cocks constructed the first such scheme, and subsequent improvements have been made to achieve anonymity and improve space efficiency. However, the anonymous variants of Cocks ’ scheme thus far are all less efficient than the original. In this paper, we present a new universally-anonymous IBE scheme based on the quadratic residuosity problem. Our scheme has better performance than the universally anonymous scheme from Ateniese and Gasti (CT-RSA 2009) at the expense of more ciphertext expansion. An...
Abstract. Identity-based encryption (IBE) is a special case of public-key encryption where user iden...
We show a framework for constructing identity-based encryption (IBE) schemes that are (almost) tight...
All anonymous identity-based encryption (IBE) schemes that are group homomorphic (to the best of our...
We introduce the first universally anonymous, thus key-private, IBE whose security is based on the s...
We introduce the first universally anonymous, thus key-private, IBE whose security is based on the s...
We develop two variants of Cocks\u27 identity-based encryption. One variant has faster encryption, w...
This paper surveys the results obtained so far in designing identity-based encryption (IBE) schemes ...
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) ...
In the design of an identity-based encryption (IBE) scheme, the primary security assumptions center ...
Abstract. Three approaches are currently used for devising identity-based encryption schemes. They b...
© International Association for Cryptologic Research 2018. In anonymous identity-based encryption (I...
Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbit...
An identity-based encryption (IBE) scheme is called anonymous if the ciphertext leaks no information...
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
Abstract. Identity-based encryption (IBE) is a special case of public-key encryption where user iden...
We show a framework for constructing identity-based encryption (IBE) schemes that are (almost) tight...
All anonymous identity-based encryption (IBE) schemes that are group homomorphic (to the best of our...
We introduce the first universally anonymous, thus key-private, IBE whose security is based on the s...
We introduce the first universally anonymous, thus key-private, IBE whose security is based on the s...
We develop two variants of Cocks\u27 identity-based encryption. One variant has faster encryption, w...
This paper surveys the results obtained so far in designing identity-based encryption (IBE) schemes ...
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) ...
In the design of an identity-based encryption (IBE) scheme, the primary security assumptions center ...
Abstract. Three approaches are currently used for devising identity-based encryption schemes. They b...
© International Association for Cryptologic Research 2018. In anonymous identity-based encryption (I...
Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbit...
An identity-based encryption (IBE) scheme is called anonymous if the ciphertext leaks no information...
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
Abstract. Identity-based encryption (IBE) is a special case of public-key encryption where user iden...
We show a framework for constructing identity-based encryption (IBE) schemes that are (almost) tight...
All anonymous identity-based encryption (IBE) schemes that are group homomorphic (to the best of our...