International audienceThe concept of Identity-Based Encryption was first introduced by Shamir (CRYPTO 1984) but were not realised until much later by Sakai, Ohgishi and Kasahara (SCIS 2000), Boneh and Franklin (CRYPTO 2001) and Cocks (IMACC 2001). Since then, Identity-Based Encryption has been a highly active area of research. While there have been several instantiations of Identity-Based Encryption and its variants, there is one glaring omission: there have been no instantiations in plain Decisional Diffie-Hellman groups. This seemed at odds with the fact that we can instantiate almost every single cryptographic primitive in plain Decisional Diffie-Hellman groups. An answer to this question came in a result by Papakonstantinou, Rackoff and...
In this paper, we present the first concrete example of identity-based undeniable signature with sel...
This paper proposes a new public key authenticated encryption (signcryption) scheme based on the har...
In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptog...
International audienceThe concept of Identity-Based Encryption was first introduced by Shamir (CRYPT...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...
The question whether Identity-Based Encryption (IBE) can be based on the Decisional Diffie-Hellman (...
Recently, Döttling and Garg (CRYPTO 2017) showed how to build identity-based encryption (IBE) from a...
The only known construction of identity-based signatures that can be proven secure in the standard m...
This paper describes a Die-Hellman based encryption scheme, DHAES. The scheme is as ecient as ElGama...
This paper proposes a new public key authenticated encryption (signcryption) scheme based on the Dif...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
SUMMARY We present and analyze an adaptive chosen ciphertext secure (IND-CCA) identity-based encrypt...
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity sec...
International audienceWe generalize the decisional problem that was used to prove the security of a ...
In this paper, we present the first concrete example of identity-based undeniable signature with sel...
This paper proposes a new public key authenticated encryption (signcryption) scheme based on the har...
In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptog...
International audienceThe concept of Identity-Based Encryption was first introduced by Shamir (CRYPT...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...
The question whether Identity-Based Encryption (IBE) can be based on the Decisional Diffie-Hellman (...
Recently, Döttling and Garg (CRYPTO 2017) showed how to build identity-based encryption (IBE) from a...
The only known construction of identity-based signatures that can be proven secure in the standard m...
This paper describes a Die-Hellman based encryption scheme, DHAES. The scheme is as ecient as ElGama...
This paper proposes a new public key authenticated encryption (signcryption) scheme based on the Dif...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
SUMMARY We present and analyze an adaptive chosen ciphertext secure (IND-CCA) identity-based encrypt...
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity sec...
International audienceWe generalize the decisional problem that was used to prove the security of a ...
In this paper, we present the first concrete example of identity-based undeniable signature with sel...
This paper proposes a new public key authenticated encryption (signcryption) scheme based on the har...
In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptog...