Recently, a lot of researches focused on identity-based encryption (IBE). The advantage of this scheme is that it can reduce the cost of the public key infrastructure by simplifying certificate management. Although IBE has its own innovations, one of its weaknesses is the key escrow problem. That is, the private key generator in IBE knows decryption keys for all identities and consequently can decrypt any ciphertexts. The certificate-based encryption (CBE) scheme proposed in EUROCRYPT 2003 provides a solution for the key escrow problem by allowing the certification authority to possess a partial decryption key that comprises the full decryption key together with the user-generated private key. In this paper, we propose new CBE schemes witho...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...
In 2003 Sakai and Kasahara proposed an identity-based encryption scheme, which has several performan...
We present a certificate-based encryption scheme which is fully secure in the standard model. Our sc...
Certificate-based encryption is a useful primitive that combines traditional public key encryption a...
Part 9: Various Aspects of Computer SecurityInternational audienceCertificate-based encryption (CBE)...
Certificateless cryptography (CL-PKC) is a concept that aims at enjoying the advantages of identity ...
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certif...
Abstract. We present a new Certificateless Public Key Encryption (CL-PKE) scheme whose security is p...
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certif...
Proxy Re-Encryption was introduced by Blaze, Bleumer and Strauss to efficiently solve the problem of...
This work develops earlier ideas of Certificateless Public Key Encryption (CL-PKE) (posted on IACR e...
This work develops earlier ideas of Certificateless Public Key Encryption (CL-PKE) (posted on IACR e...
Proxy re-encryption (PRE) is a cryptographic primitive introduced by Blaze, Bleumer and Strauss to p...
AbstractCertificate-based cryptosystem combines the advantage of both traditional public key cryptos...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...
In 2003 Sakai and Kasahara proposed an identity-based encryption scheme, which has several performan...
We present a certificate-based encryption scheme which is fully secure in the standard model. Our sc...
Certificate-based encryption is a useful primitive that combines traditional public key encryption a...
Part 9: Various Aspects of Computer SecurityInternational audienceCertificate-based encryption (CBE)...
Certificateless cryptography (CL-PKC) is a concept that aims at enjoying the advantages of identity ...
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certif...
Abstract. We present a new Certificateless Public Key Encryption (CL-PKE) scheme whose security is p...
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certif...
Proxy Re-Encryption was introduced by Blaze, Bleumer and Strauss to efficiently solve the problem of...
This work develops earlier ideas of Certificateless Public Key Encryption (CL-PKE) (posted on IACR e...
This work develops earlier ideas of Certificateless Public Key Encryption (CL-PKE) (posted on IACR e...
Proxy re-encryption (PRE) is a cryptographic primitive introduced by Blaze, Bleumer and Strauss to p...
AbstractCertificate-based cryptosystem combines the advantage of both traditional public key cryptos...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...
In 2003 Sakai and Kasahara proposed an identity-based encryption scheme, which has several performan...