Abstract We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming a variant of the computational DiffieHellman problem. Our system is based on bilinear maps between groups. The Weil pairing on elliptic curves is an example of such a map. We give precise definitions for secure identity based encryption schemes and give several applications for such systems
International audienceIdentity Based Encryption is an approach to link the public key to an identity...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
Abstract. In 2001, Boneh and Franklin presented the first efficient and security-proved identity-bas...
We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen cipherte...
We present a new identity based scheme using pairings over elliptic curves. It combines the function...
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbit...
Most traditional public key cryptosystems are constructed upon algebraically rich structures, which ...
In recent years, many applications of elliptic curves to cryptography have been developed. Cryptosy...
This paper surveys the practical benefits and drawbacks of several identity-based encryption schemes...
Abstract. In this paper, we give a first example of identity based undeniable signature using pairin...
Abstract. We present efficient Identity-Based Encryption (IBE) and signature schemes under the Symme...
Abstract. We present a variant of the Boneh & Franklin Identiybased Encryption IBE scheme to der...
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity sec...
In this paper, we focus on constructing IBE from hardness assumptions without pairings. Especially, ...
International audienceIdentity Based Encryption is an approach to link the public key to an identity...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
Abstract. In 2001, Boneh and Franklin presented the first efficient and security-proved identity-bas...
We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen cipherte...
We present a new identity based scheme using pairings over elliptic curves. It combines the function...
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbit...
Most traditional public key cryptosystems are constructed upon algebraically rich structures, which ...
In recent years, many applications of elliptic curves to cryptography have been developed. Cryptosy...
This paper surveys the practical benefits and drawbacks of several identity-based encryption schemes...
Abstract. In this paper, we give a first example of identity based undeniable signature using pairin...
Abstract. We present efficient Identity-Based Encryption (IBE) and signature schemes under the Symme...
Abstract. We present a variant of the Boneh & Franklin Identiybased Encryption IBE scheme to der...
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity sec...
In this paper, we focus on constructing IBE from hardness assumptions without pairings. Especially, ...
International audienceIdentity Based Encryption is an approach to link the public key to an identity...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
Abstract. In 2001, Boneh and Franklin presented the first efficient and security-proved identity-bas...