International audienceIn this paper, we introduce a new primitive called identity-based encryption with wildcards, or WIBE for short. It allows a sender to encrypt messages to a whole range of receivers whose identities match a certain pattern. This pattern is defined through a sequence of fixed strings and wildcards, where any string can take the place of a wildcard in a matching identity. Our primitive can be applied to provide an intuitive way to send encrypted email to groups of users in a corporate hierarchy. We propose a full security notion and give efficient implementations meeting this notion under different pairing-related assumptions, both in the random oracle model and in the standard model
Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret...
An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented ...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
In this paper we introduce the notion of identity based encryption with wildcards, or WIBE for short...
International audienceInspired by the fact that many e-mail addresses correspond to groups of users,...
International audienceThis paper introduces a new primitive called identity-based encryption with wi...
© 2020, Innovative Information Science and Technology Research Group. All rights reserved. Wildcard ...
We formalize the standard application of identity-based encryption (IBE), namely non-interactive sec...
International audienceSeveral broadcast encryption (BE) constructions have been proposed since Fiat ...
Abstract We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen...
We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen cipherte...
A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the publ...
In 1984, Shamir managed to build an Identity-Based Encryption (IBE) scheme in which an entity's publ...
Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret ...
A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the publ...
Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret...
An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented ...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
In this paper we introduce the notion of identity based encryption with wildcards, or WIBE for short...
International audienceInspired by the fact that many e-mail addresses correspond to groups of users,...
International audienceThis paper introduces a new primitive called identity-based encryption with wi...
© 2020, Innovative Information Science and Technology Research Group. All rights reserved. Wildcard ...
We formalize the standard application of identity-based encryption (IBE), namely non-interactive sec...
International audienceSeveral broadcast encryption (BE) constructions have been proposed since Fiat ...
Abstract We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen...
We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen cipherte...
A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the publ...
In 1984, Shamir managed to build an Identity-Based Encryption (IBE) scheme in which an entity's publ...
Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret ...
A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the publ...
Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret...
An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented ...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...