In 2003 Sakai and Kasahara proposed an identity-based encryption scheme, which has several performance advantages over existing methods. However, the scheme does not meet the standard security requirement. This work presented an efficient IBE scheme that employs a simple version of the Sakai-Kasahara scheme and the Fujisaki-Okamoto transformation. The chosen-ciphertext security of the scheme was rigorously proved in the random oracle model based on a reasonable hardness assumption. The work offers implementers an alternative to those patented protected schemes with an efficient and security proved scheme and has been used to construct other primitive such as identity-based signcryption, CL-PKEs, etc
In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptog...
Recently, a lot of researches focused on identity-based encryption (IBE). The advantage of this sche...
MasterEncryption and signature have been considered the fundamental cryptographic tools of public ke...
In 2003 Sakai and Kasahara proposed an identity-based encryption scheme, which has several performan...
Abstract. Identity-based encryption (IBE) is a special asymmetric en-cryption method where a public ...
Abstract. Identity-based encryption (IBE) is a special asymmetric en-cryption method where a public ...
Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption...
Abstract. In 2001, Boneh and Franklin presented the first efficient and security-proved identity-bas...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
This paper presents a first example of secure identity based encryption scheme (IBE) without redunda...
In EUROCRYPT 2004, Boneh and Boyen presented two efficient Identity Based Encryption (IBE) schemes t...
In EUROCRYPT 2004, Boneh and Boyen presented two efficient Identity Based Encryption (IBE) schemes t...
Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbit...
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...
The idea of signcryption is to provide a method to encrypt and sign data together, so it is more eff...
In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptog...
Recently, a lot of researches focused on identity-based encryption (IBE). The advantage of this sche...
MasterEncryption and signature have been considered the fundamental cryptographic tools of public ke...
In 2003 Sakai and Kasahara proposed an identity-based encryption scheme, which has several performan...
Abstract. Identity-based encryption (IBE) is a special asymmetric en-cryption method where a public ...
Abstract. Identity-based encryption (IBE) is a special asymmetric en-cryption method where a public ...
Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption...
Abstract. In 2001, Boneh and Franklin presented the first efficient and security-proved identity-bas...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
This paper presents a first example of secure identity based encryption scheme (IBE) without redunda...
In EUROCRYPT 2004, Boneh and Boyen presented two efficient Identity Based Encryption (IBE) schemes t...
In EUROCRYPT 2004, Boneh and Boyen presented two efficient Identity Based Encryption (IBE) schemes t...
Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbit...
We propose a simple and e#cient construction of a CCAsecure public-key encryption scheme from any C...
The idea of signcryption is to provide a method to encrypt and sign data together, so it is more eff...
In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptog...
Recently, a lot of researches focused on identity-based encryption (IBE). The advantage of this sche...
MasterEncryption and signature have been considered the fundamental cryptographic tools of public ke...