In this paper, we introduce a general paradigm called identity-based extractable hash proof system (IB-EHPS), which is an extension of extractable hash proof system (EHPS) proposed by Wee (CRYPTO’10). We show how to construct identity-based key encapsulation mechanism (IB-KEM) from IB-EHPS in a simple and modular fashion. Our construction provides a generic method of building and interpreting CCA-secure IB-KEMs based on computational assumptions. As instantiations, we realize IB-EHPS from the bilinear Diffie–Hellman assumption and the modified bilinear Diffie–Hellman assumption, respectively. Besides, we carefully investigate the relation between EHPS and IB-EHPS, and indicate possible refinement and generalization of EHPS
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...
Abstract. We construct an Identity-Based Key Encapsulation Mechanism (IB-KEM) in a generic “leveled ...
We ask whether an Identity Based Encryption (IBE) sys-tem can be built from simpler public-key primi...
In this paper, we introduce a general paradigm called identity-based extractable hash proof system (...
In this paper, we introduce a general paradigm called identity-based extractable hash proof system (...
Abstract. We propose a generic way for deriving an identication (ID) scheme se-cure against concurre...
We propose a generic construction that yields efficient identity-based encryption (IBE) schemes secu...
In this work, we generalize the paradigm of hash proof system (HPS) proposed by Cramer and Shoup [CS...
We describe a new and practical identity-based key encapsulation mechanism that is secure in the sta...
This work presented an identity-based key encapsulation mechanism (ID-KEM). It is possible to use th...
Abstract. We introduce the concept of identity based key encapsulation to multiple parties (mID-KEM)...
Abstract. Security against selective opening attack (SOA) requires that in a multi-user setting, eve...
Abstract. While the hybrid public key encryption scheme of Kurosawa and Desmedt (CRYPTO 2004) is pro...
In 1984, Shamir managed to build an Identity-Based Encryption (IBE) scheme in which an entity's publ...
A well-known concern in the setting of identity based en-cryption is that the PKG is all powerful an...
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...
Abstract. We construct an Identity-Based Key Encapsulation Mechanism (IB-KEM) in a generic “leveled ...
We ask whether an Identity Based Encryption (IBE) sys-tem can be built from simpler public-key primi...
In this paper, we introduce a general paradigm called identity-based extractable hash proof system (...
In this paper, we introduce a general paradigm called identity-based extractable hash proof system (...
Abstract. We propose a generic way for deriving an identication (ID) scheme se-cure against concurre...
We propose a generic construction that yields efficient identity-based encryption (IBE) schemes secu...
In this work, we generalize the paradigm of hash proof system (HPS) proposed by Cramer and Shoup [CS...
We describe a new and practical identity-based key encapsulation mechanism that is secure in the sta...
This work presented an identity-based key encapsulation mechanism (ID-KEM). It is possible to use th...
Abstract. We introduce the concept of identity based key encapsulation to multiple parties (mID-KEM)...
Abstract. Security against selective opening attack (SOA) requires that in a multi-user setting, eve...
Abstract. While the hybrid public key encryption scheme of Kurosawa and Desmedt (CRYPTO 2004) is pro...
In 1984, Shamir managed to build an Identity-Based Encryption (IBE) scheme in which an entity's publ...
A well-known concern in the setting of identity based en-cryption is that the PKG is all powerful an...
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...
Abstract. We construct an Identity-Based Key Encapsulation Mechanism (IB-KEM) in a generic “leveled ...
We ask whether an Identity Based Encryption (IBE) sys-tem can be built from simpler public-key primi...