We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped with a bilinear map. Selective-identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in an adaptive-identity attack the adversary is allowed to choose this identity adaptively. Our first system—BB1—is based on the well studied decisional bilinear Diffie–Hellman assumption, and extends naturally to systems with hierarchical identities, or HIBE. Our second system—BB2—is based on a stronger assumption which we call the Bilinear Diffie–Hellma...
We describe a new and practical identity-based key encapsulation mechanism that is secure in the sta...
ID-based encryption allows for a sender to encrypt a message to an identity without access to a publ...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity sec...
We describe a practical identity-based encryption scheme that is secure in the standard model agains...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical...
AbstractWe describe a practical identity-based encryption scheme that is secure in the standard mode...
We propose a new efficient identity-based broadcast encryption scheme without random oracles and pro...
We propose a new efficient identity-based broadcast encryption scheme without random oracles and pro...
In EUROCRYPT 2004, Boneh and Boyen presented two efficient Identity Based Encryption (IBE) schemes t...
In EUROCRYPT 2004, Boneh and Boyen presented two efficient Identity Based Encryption (IBE) schemes t...
Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbit...
In a famous paper of Crypto\u2701, Boneh and Franklin proposed the first identity-based encryption s...
We construct two identity-based encryption (IBE) schemes. The first one is IBE satisfying key depend...
We describe a new and practical identity-based key encapsulation mechanism that is secure in the sta...
ID-based encryption allows for a sender to encrypt a message to an identity without access to a publ...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity sec...
We describe a practical identity-based encryption scheme that is secure in the standard model agains...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical...
AbstractWe describe a practical identity-based encryption scheme that is secure in the standard mode...
We propose a new efficient identity-based broadcast encryption scheme without random oracles and pro...
We propose a new efficient identity-based broadcast encryption scheme without random oracles and pro...
In EUROCRYPT 2004, Boneh and Boyen presented two efficient Identity Based Encryption (IBE) schemes t...
In EUROCRYPT 2004, Boneh and Boyen presented two efficient Identity Based Encryption (IBE) schemes t...
Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbit...
In a famous paper of Crypto\u2701, Boneh and Franklin proposed the first identity-based encryption s...
We construct two identity-based encryption (IBE) schemes. The first one is IBE satisfying key depend...
We describe a new and practical identity-based key encapsulation mechanism that is secure in the sta...
ID-based encryption allows for a sender to encrypt a message to an identity without access to a publ...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...