We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming a variant of the computational Diffie-Hellman problem. Our system is based on bilinear maps between groups. The Weil pairing on elliptic curves is an example of such a map. We give precise definitions for secure identity based encryption schemes and give several applications for such systems.
In this paper, we focus on constructing IBE from hardness assumptions without pairings. Especially, ...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...
Abstract. In 2001, Boneh and Franklin presented the first efficient and security-proved identity-bas...
Abstract We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen...
We present a new identity based scheme using pairings over elliptic curves. It combines the function...
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
This paper surveys the practical benefits and drawbacks of several identity-based encryption schemes...
Most traditional public key cryptosystems are constructed upon algebraically rich structures, which ...
Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbit...
Abstract. We present efficient Identity-Based Encryption (IBE) and signature schemes under the Symme...
Abstract. In this paper, we give a first example of identity based undeniable signature using pairin...
In recent years, many applications of elliptic curves to cryptography have been developed. Cryptosy...
International audienceIdentity Based Encryption is an approach to link the public key to an identity...
Abstract. We present a variant of the Boneh & Franklin Identiybased Encryption IBE scheme to der...
In this letter, we come up with an ID-based signature scheme from the Weil pairing. Our scheme is se...
In this paper, we focus on constructing IBE from hardness assumptions without pairings. Especially, ...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...
Abstract. In 2001, Boneh and Franklin presented the first efficient and security-proved identity-bas...
Abstract We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen...
We present a new identity based scheme using pairings over elliptic curves. It combines the function...
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
This paper surveys the practical benefits and drawbacks of several identity-based encryption schemes...
Most traditional public key cryptosystems are constructed upon algebraically rich structures, which ...
Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbit...
Abstract. We present efficient Identity-Based Encryption (IBE) and signature schemes under the Symme...
Abstract. In this paper, we give a first example of identity based undeniable signature using pairin...
In recent years, many applications of elliptic curves to cryptography have been developed. Cryptosy...
International audienceIdentity Based Encryption is an approach to link the public key to an identity...
Abstract. We present a variant of the Boneh & Franklin Identiybased Encryption IBE scheme to der...
In this letter, we come up with an ID-based signature scheme from the Weil pairing. Our scheme is se...
In this paper, we focus on constructing IBE from hardness assumptions without pairings. Especially, ...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...
Abstract. In 2001, Boneh and Franklin presented the first efficient and security-proved identity-bas...