In this paper we construct two new fuzzy identity-based encryption (IBE) schemes in the random oracle model. Not only do our schemes provide public parameters whose size is independent of the number of attributes in each identity (used as public key) but they also have useful structures which result in more efficient key extraction and/or encryption than the random oracle version of Sahai and Water\u27s fuzzy IBE scheme, considered recently by Pirretti et al. We prove that the confidentiality of the proposed schemes is relative to the Bilinear Decisional Bilinear Diffie-Hellman problem
In EUROCRYPT 2004, Boneh and Boyen presented two efficient Identity Based Encryption (IBE) schemes t...
International audienceThe concept of Identity-Based Encryption was first introduced by Shamir (CRYPT...
We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen cipherte...
Abstract. We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Ident...
International audienceWe propose new constructions for identity-based broadcast encryption (IBBE) an...
Abstract—Sahai and Waters introduced a fuzzy id-based encryption (FIBE) scheme in which an identity ...
Abstract We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen...
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity sec...
The issue of data and information security on the internet and social network has become more seriou...
The British Computer Society 2018. All rights reserved. Provably secure identity-based encryption (I...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
Biometric identity-based encryption (Bio-IBE) is a kind of fuzzy identity-based encryption (fuzzy IB...
This work explains the fundamental definitions required to define and create Fuzzy Identity-Based En...
Most traditional public key cryptosystems are constructed upon algebraically rich structures, which ...
We propose the first leakage-resilient Identity-Based Encryption (IBE) scheme with full domain hash ...
In EUROCRYPT 2004, Boneh and Boyen presented two efficient Identity Based Encryption (IBE) schemes t...
International audienceThe concept of Identity-Based Encryption was first introduced by Shamir (CRYPT...
We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen cipherte...
Abstract. We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Ident...
International audienceWe propose new constructions for identity-based broadcast encryption (IBBE) an...
Abstract—Sahai and Waters introduced a fuzzy id-based encryption (FIBE) scheme in which an identity ...
Abstract We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen...
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity sec...
The issue of data and information security on the internet and social network has become more seriou...
The British Computer Society 2018. All rights reserved. Provably secure identity-based encryption (I...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
Biometric identity-based encryption (Bio-IBE) is a kind of fuzzy identity-based encryption (fuzzy IB...
This work explains the fundamental definitions required to define and create Fuzzy Identity-Based En...
Most traditional public key cryptosystems are constructed upon algebraically rich structures, which ...
We propose the first leakage-resilient Identity-Based Encryption (IBE) scheme with full domain hash ...
In EUROCRYPT 2004, Boneh and Boyen presented two efficient Identity Based Encryption (IBE) schemes t...
International audienceThe concept of Identity-Based Encryption was first introduced by Shamir (CRYPT...
We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen cipherte...