An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages over the Internet. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications. Although a distributed PKG has been suggested as a way to mitigate this problem for Boneh and Franklin’s IBE scheme, the security of this distributed protocol has not been proven and the proposed solution does not work over the asynchronous Internet. Further, a distributed PKG has not been considered for any other IBE scheme. In this paper, we design distributed PKG setup and private key extraction protocols in an asynchronous communicatio...
In this paper, we present a variant of Waters\u27 Identity-Based Encryption scheme with a much small...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...
We introduce the first universally anonymous, thus key-private, IBE whose security is based on the s...
Distributed private key generators (PKGs) in identity-based encryption (IBE) is a viable approach to...
Numerous cryptographic applications require a trusted authority to hold a secret. With a plethora o...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
For a long time, pairings on elliptic curves have been considered to be destructive in elliptic curv...
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does...
Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the sec...
We define key privacy for IBE systems in terms of two properties, indistinguishability under chosen ...
Abstract.We introduce the notion of distributed password-based public-key cryptography, where a virt...
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strength...
Mass surveillance and a lack of end-user encryption, coupled with a growing demand for key escrow un...
AbstractAn IBE (identity-based encryption) technique is a very valuable implement in cryptography an...
Abstract. Key-insulated cryptography is a crucial technique for pro-tecting private keys. To strengt...
In this paper, we present a variant of Waters\u27 Identity-Based Encryption scheme with a much small...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...
We introduce the first universally anonymous, thus key-private, IBE whose security is based on the s...
Distributed private key generators (PKGs) in identity-based encryption (IBE) is a viable approach to...
Numerous cryptographic applications require a trusted authority to hold a secret. With a plethora o...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
For a long time, pairings on elliptic curves have been considered to be destructive in elliptic curv...
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does...
Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the sec...
We define key privacy for IBE systems in terms of two properties, indistinguishability under chosen ...
Abstract.We introduce the notion of distributed password-based public-key cryptography, where a virt...
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strength...
Mass surveillance and a lack of end-user encryption, coupled with a growing demand for key escrow un...
AbstractAn IBE (identity-based encryption) technique is a very valuable implement in cryptography an...
Abstract. Key-insulated cryptography is a crucial technique for pro-tecting private keys. To strengt...
In this paper, we present a variant of Waters\u27 Identity-Based Encryption scheme with a much small...
Distributed key generation (DKG) has been studied extensively in the cryptographic literature. Howev...
We introduce the first universally anonymous, thus key-private, IBE whose security is based on the s...