During this Thesis we investigated the possibilities that Identity-based Encryption offers when used out of their original purpose. We managed to generalize a whole class of different identity-based encryption schemes into Downgradable Identity-based Encryptions. We found a generic way to construct Blind Identity-based Encryptions. These two works leads both to applications that are not a priori linked with IBE: Attribute-based Encryption from Downgradable IBE and Oblivious Transfer for Blind IBE, in the case of Affine IBE we manage to reduce the communication cost from a linear to logarithmic. As application we also find a way to use Hierarchical IBE to construct a special type of signature called Identity-based Designated Verifier Signatu...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
In this paper, we propose an efficient identity-based password authenticated key exchange (IBPAKE) p...
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical...
During this Thesis we investigated the possibilities that Identity-based Encryption offers when used...
Dans cette thèse nous étudions les possibilités que les chiffrements basés sur l’identité offrent qu...
Abstract. Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography...
In this thesis, we use building blocks to propose new one or with new interesting properties. First,...
In traditional public key cryptography, public keys of users are essentially random strings generate...
© International Association for Cryptologic Research 2018. In anonymous identity-based encryption (I...
In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptog...
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity sec...
International audienceWe provide a generic transformation from any affine message authentication cod...
The only known construction of identity-based signatures that can be proven secure in the standard m...
The original publication is available at www.springerlink.comIdentity-based encryption is a very con...
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
In this paper, we propose an efficient identity-based password authenticated key exchange (IBPAKE) p...
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical...
During this Thesis we investigated the possibilities that Identity-based Encryption offers when used...
Dans cette thèse nous étudions les possibilités que les chiffrements basés sur l’identité offrent qu...
Abstract. Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography...
In this thesis, we use building blocks to propose new one or with new interesting properties. First,...
In traditional public key cryptography, public keys of users are essentially random strings generate...
© International Association for Cryptologic Research 2018. In anonymous identity-based encryption (I...
In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptog...
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity sec...
International audienceWe provide a generic transformation from any affine message authentication cod...
The only known construction of identity-based signatures that can be proven secure in the standard m...
The original publication is available at www.springerlink.comIdentity-based encryption is a very con...
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
In this paper, we propose an efficient identity-based password authenticated key exchange (IBPAKE) p...
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical...