In EUROCRYPT 2004, Boneh and Boyen presented two efficient Identity Based Encryption (IBE) schemes that are selective-identity secure in the standard model. Particularly, the first one known as BB1-IBE, which is characterized by commutative blinding technique (BB1-style), distinguishes itself as the most fertile ground for many applications. They also proved that BB1-IBE is fully secure in the random oracle model but with a looser reduction. In this paper, we propose a novel IBE scheme of BB1-style, which is fully secure in the random oracle model with a tighter reduction. Additionally, we give a chosen ciphertext secure construction of our scheme from twin technique.http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=P...
Abstract. Security against selective opening attack (SOA) requires that in a multi-user setting, eve...
SUMMARY We present and analyze an adaptive chosen ciphertext secure (IND-CCA) identity-based encrypt...
In this paper, we present a variant of Waters\u27 Identity-Based Encryption scheme with a much small...
In EUROCRYPT 2004, Boneh and Boyen presented two efficient Identity Based Encryption (IBE) schemes t...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity sec...
Abstract. Identity-based encryption (IBE) is a special asymmetric en-cryption method where a public ...
Abstract. Identity-based encryption (IBE) is a special asymmetric en-cryption method where a public ...
In 2003 Sakai and Kasahara proposed an identity-based encryption scheme, which has several performan...
We describe a practical identity-based encryption scheme that is secure in the standard model agains...
In 2003 Sakai and Kasahara proposed an identity-based encryption scheme, which has several performan...
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity sec...
This paper presents a first example of secure identity based encryption scheme (IBE) without redunda...
We show that Katz-Wang's duplicating key and ciphertext technique can be extended to a generic ...
We propose a generic construction that yields efficient identity-based encryption (IBE) schemes secu...
Abstract. Security against selective opening attack (SOA) requires that in a multi-user setting, eve...
SUMMARY We present and analyze an adaptive chosen ciphertext secure (IND-CCA) identity-based encrypt...
In this paper, we present a variant of Waters\u27 Identity-Based Encryption scheme with a much small...
In EUROCRYPT 2004, Boneh and Boyen presented two efficient Identity Based Encryption (IBE) schemes t...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity sec...
Abstract. Identity-based encryption (IBE) is a special asymmetric en-cryption method where a public ...
Abstract. Identity-based encryption (IBE) is a special asymmetric en-cryption method where a public ...
In 2003 Sakai and Kasahara proposed an identity-based encryption scheme, which has several performan...
We describe a practical identity-based encryption scheme that is secure in the standard model agains...
In 2003 Sakai and Kasahara proposed an identity-based encryption scheme, which has several performan...
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity sec...
This paper presents a first example of secure identity based encryption scheme (IBE) without redunda...
We show that Katz-Wang's duplicating key and ciphertext technique can be extended to a generic ...
We propose a generic construction that yields efficient identity-based encryption (IBE) schemes secu...
Abstract. Security against selective opening attack (SOA) requires that in a multi-user setting, eve...
SUMMARY We present and analyze an adaptive chosen ciphertext secure (IND-CCA) identity-based encrypt...
In this paper, we present a variant of Waters\u27 Identity-Based Encryption scheme with a much small...