This paper presents an identity-based hierarchical designated decryption (IHDD) scheme which allows a message sender to generate ciphertexts that can be decrypted by (1) only a specified recipient or (2) a specified recipient and all or some of its ancestor users in the hierarchy tree. The newly proposed scheme can be considered as a combination of the hierarchical identity-based encryption (HIBE) and the identity-based multirecipient encryption scheme (ID-based MRES). However, the purpose and structure of the proposed IHDD scheme are different from those of the HIBE and the ID-based MRES. The proposed IHDD scheme has low computation complexity, in which the decryption operation needs only one bilinear pairing computation, and constant leng...
A forward-secure encryption scheme protects secret keys from exposure by evolving the keys with time...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...
International audienceWe generalize the decisional problem that was used to prove the security of a ...
Abstract. We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext con...
Hierarchical Identity-Based Encryption (HIBE) is a generalisation of Identity-Based Encryption (IBE)...
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of j...
At EUROCRYPT 2004, Boneh and Boyen [5] proposed a new hierarchical identity-based (ID-based) encrypt...
We construct the first hierarchical identity-based encryption (HIBE) scheme with tight adaptive secu...
In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptog...
Hierarchical identity-based encryption (HIBE) is a generalization of identity-based encryption (IBE)...
Abstract. In Informatica 32 (2008), Ren and Gu proposed an anonymous hierarchical identity based enc...
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical...
International audienceThis paper introduces a new primitive called identity-based encryption with wi...
Abstract. We propose a hierarchical identity-based signature (HIBS) scheme which is provable in the ...
An ID-based encryption (IBE) is a public key cryptosystem, in which a user's public key is given as ...
A forward-secure encryption scheme protects secret keys from exposure by evolving the keys with time...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...
International audienceWe generalize the decisional problem that was used to prove the security of a ...
Abstract. We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext con...
Hierarchical Identity-Based Encryption (HIBE) is a generalisation of Identity-Based Encryption (IBE)...
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of j...
At EUROCRYPT 2004, Boneh and Boyen [5] proposed a new hierarchical identity-based (ID-based) encrypt...
We construct the first hierarchical identity-based encryption (HIBE) scheme with tight adaptive secu...
In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptog...
Hierarchical identity-based encryption (HIBE) is a generalization of identity-based encryption (IBE)...
Abstract. In Informatica 32 (2008), Ren and Gu proposed an anonymous hierarchical identity based enc...
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical...
International audienceThis paper introduces a new primitive called identity-based encryption with wi...
Abstract. We propose a hierarchical identity-based signature (HIBS) scheme which is provable in the ...
An ID-based encryption (IBE) is a public key cryptosystem, in which a user's public key is given as ...
A forward-secure encryption scheme protects secret keys from exposure by evolving the keys with time...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...
International audienceWe generalize the decisional problem that was used to prove the security of a ...