We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes secure against adaptive chosen-ciphertext attacks) based on any identity-based encryption (IBE) scheme. Our constructions have ramifications of both theoretical and practical interest. First, our schemes give a new paradigm for achieving CCA-security; this paradigm avoids “proofs of well-formedness ” that have been shown to underlie previous constructions. Second, instantiating our construction using known IBE constructions we obtain CCA-secure encryption schemes whose performance is competitive with the most efficient CCA-secure schemes to date. Our techniques extend naturally to give an efficient method for securing IBE schemes (even hierarchical ones)...
Abstract. The paradigms currently used to realize symmetric encryp-tion schemes secure against adapt...
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involvi...
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involvi...
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...
Abstract. Security against selective opening attack (SOA) requires that in a multi-user setting, eve...
We describe a practical identity-based encryption scheme that is secure in the standard model agains...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
International audienceWe consider designing broadcast encryption schemes with constant-size secret k...
AbstractWe describe a practical identity-based encryption scheme that is secure in the standard mode...
We propose a generic construction that yields efficient identity-based encryption (IBE) schemes secu...
In this paper we present the first CCA-secure public key encryption scheme that is structure preserv...
Abstract. The paradigms currently used to realize symmetric encryp-tion schemes secure against adapt...
textabstractImagine many small devices send data to a single receiver, encrypted using the receiver'...
One of the celebrated applications of Identity-Based Encryption (IBE) is the Canetti, Halevi, and Ka...
Abstract. The paradigms currently used to realize symmetric encryp-tion schemes secure against adapt...
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involvi...
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involvi...
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...
Abstract. Security against selective opening attack (SOA) requires that in a multi-user setting, eve...
We describe a practical identity-based encryption scheme that is secure in the standard model agains...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
International audienceWe consider designing public-key broadcast encryption schemes with constant-si...
International audienceWe consider designing broadcast encryption schemes with constant-size secret k...
AbstractWe describe a practical identity-based encryption scheme that is secure in the standard mode...
We propose a generic construction that yields efficient identity-based encryption (IBE) schemes secu...
In this paper we present the first CCA-secure public key encryption scheme that is structure preserv...
Abstract. The paradigms currently used to realize symmetric encryp-tion schemes secure against adapt...
textabstractImagine many small devices send data to a single receiver, encrypted using the receiver'...
One of the celebrated applications of Identity-Based Encryption (IBE) is the Canetti, Halevi, and Ka...
Abstract. The paradigms currently used to realize symmetric encryp-tion schemes secure against adapt...
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involvi...
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involvi...