Since its induction, the selective-identity (sID) model for identity-based cryptosystems and its relationship with various other notions of security has been extensively studied. As a result, it is a general consensus that the sID model is much weaker than the full-identity (ID) model. In this paper, we study the sID model for the particular case of identity-based signatures (IBS). The main focus is on the problem of constructing an ID-secure IBS given an sID-secure IBS without using random oracles–the so-called standard model–and with reasonable security degradation. We accomplish this by devising a generic construction which uses as black-box: i) a chameleon hash function and ii) a weakly-secure public-key signature. We argue that the res...
Abstract. We present the first provably secure ID-based key agreement protocol, inspired by the ID-b...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
[[abstract]]In this study, we propose a new ID-based beta cryptosystem scheme secure under selective...
Since its induction, the selective-identity (sID) model for identity-based cryptosystems and its rel...
An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented ...
Digital signature, one of cryptographic primitives, provides the integrity, authentication and non-r...
Identity-based signature (IBS) is a specific type of public-key signature (PKS) where any identity s...
Digital signature, one of cryptographic primitives, provides the integrity, authentication and non-r...
AbstractA new identity-based short signature(IBS) is proposed in this paper. The new scheme is const...
The only known construction of identity-based signatures that can be proven secure in the standard m...
Abstract. Security against selective opening attack (SOA) requires that in a multi-user setting, eve...
In Africacrypt 2009, Galindo and Garcia proposed a lightweight identity-based signature (IBS) scheme...
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity sec...
At EUROCRYPT 2004, Boneh and Boyen [5] proposed a new hierarchical identity-based (ID-based) encrypt...
In this paper, we propose an efficient identity-based identification (IBI) scheme provably secure ag...
Abstract. We present the first provably secure ID-based key agreement protocol, inspired by the ID-b...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
[[abstract]]In this study, we propose a new ID-based beta cryptosystem scheme secure under selective...
Since its induction, the selective-identity (sID) model for identity-based cryptosystems and its rel...
An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented ...
Digital signature, one of cryptographic primitives, provides the integrity, authentication and non-r...
Identity-based signature (IBS) is a specific type of public-key signature (PKS) where any identity s...
Digital signature, one of cryptographic primitives, provides the integrity, authentication and non-r...
AbstractA new identity-based short signature(IBS) is proposed in this paper. The new scheme is const...
The only known construction of identity-based signatures that can be proven secure in the standard m...
Abstract. Security against selective opening attack (SOA) requires that in a multi-user setting, eve...
In Africacrypt 2009, Galindo and Garcia proposed a lightweight identity-based signature (IBS) scheme...
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity sec...
At EUROCRYPT 2004, Boneh and Boyen [5] proposed a new hierarchical identity-based (ID-based) encrypt...
In this paper, we propose an efficient identity-based identification (IBI) scheme provably secure ag...
Abstract. We present the first provably secure ID-based key agreement protocol, inspired by the ID-b...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
[[abstract]]In this study, we propose a new ID-based beta cryptosystem scheme secure under selective...