International audienceAt Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a convenient tool to reduce the amount of trust in authorities in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re-distributes users' decryption keys, it runs the risk of being caught and prosecuted. Goyal proposed two constructions: the first one is efficient but can only trace well-formed decryption keys to their source; the second one allows tracing obfuscated decryption boxes in a model (called weak black-box model) where cheating authorities have no decryption oracle. The latter scheme is unfortunately far less efficient in terms of decryption cost and ciphertext size. In this...
Reducibility between different cryptographic primitives is a fundamental problem in modern cryptogra...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
The original publication is available at www.springerlink.comInternational audienceIdentity-based en...
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a c...
Abstract. At Crypto’07, Goyal introduced the concept of Accountable Authority Identity-Based En-cryp...
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption (A-IBE...
Accountable authority identity-based encryption (A-IBE), as an attractive way to guarantee the user ...
Accountable identity-based encryption (A-IBE) was proposed to relieve the key escrow problem caused ...
© 2019 Elsevier B.V. Identity-based broadcast encryption (IBBE) enables a sender to broadcast a mess...
A well-known concern in the setting of identity based en-cryption is that the PKG is all powerful an...
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encr...
© 2019 The British Computer Society. All rights reserved. Identity-based revocation system (IBRS) ge...
In the context of Ciphertext-Policy Attribute-Based Encryption (CP-ABE), if a decryption device asso...
In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), access policies associated with the cipher...
Identity-based traitor tracing (IBTT) scheme can be utilized to identify a private (decryption) key ...
Reducibility between different cryptographic primitives is a fundamental problem in modern cryptogra...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
The original publication is available at www.springerlink.comInternational audienceIdentity-based en...
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a c...
Abstract. At Crypto’07, Goyal introduced the concept of Accountable Authority Identity-Based En-cryp...
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption (A-IBE...
Accountable authority identity-based encryption (A-IBE), as an attractive way to guarantee the user ...
Accountable identity-based encryption (A-IBE) was proposed to relieve the key escrow problem caused ...
© 2019 Elsevier B.V. Identity-based broadcast encryption (IBBE) enables a sender to broadcast a mess...
A well-known concern in the setting of identity based en-cryption is that the PKG is all powerful an...
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encr...
© 2019 The British Computer Society. All rights reserved. Identity-based revocation system (IBRS) ge...
In the context of Ciphertext-Policy Attribute-Based Encryption (CP-ABE), if a decryption device asso...
In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), access policies associated with the cipher...
Identity-based traitor tracing (IBTT) scheme can be utilized to identify a private (decryption) key ...
Reducibility between different cryptographic primitives is a fundamental problem in modern cryptogra...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
The original publication is available at www.springerlink.comInternational audienceIdentity-based en...