We develop two variants of Cocks\u27 identity-based encryption. One variant has faster encryption, where the most time-consuming part only requires several modular multiplications. The other variant makes the first variant anonymous under suitable complexity assumptions, while its decryption efficiency is about twice lower than the first one. Both the variants have ciphertext expansion twice more extensive than the original Cocks\u27 identity-based encryption. To alleviate the issue of the second variant\u27s large ciphertext expansion, we consider using it to construct a public-key encryption with keyword search scheme with a fast encryption algorithm
The Cocks IBE Scheme was first proposed by Clifford Cocks in 2001 at the 8th IMA International Confe...
In this paper, we present a variant of Waters\u27 Identity-Based Encryption scheme with a much small...
Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbit...
Abstract. Identity Based Encryption (IBE) has been constructed from bilinear pairings, lattices and ...
We introduce the first universally anonymous, thus key-private, IBE whose security is based on the s...
In the design of an identity-based encryption (IBE) scheme, the primary security assumptions center ...
This paper surveys the results obtained so far in designing identity-based encryption (IBE) schemes ...
Abstract. Three approaches are currently used for devising identity-based encryption schemes. They b...
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) ...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical...
Identity Based Encryption is a public key cryptosystem where the user’s identity becomes the public ...
We introduce the first universally anonymous, thus key-private, IBE whose security is based on the s...
In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an Identity-based Encryption ...
Efficient and privacy-preserving constructions for search functionality on encrypted data is importa...
The Cocks IBE Scheme was first proposed by Clifford Cocks in 2001 at the 8th IMA International Confe...
In this paper, we present a variant of Waters\u27 Identity-Based Encryption scheme with a much small...
Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbit...
Abstract. Identity Based Encryption (IBE) has been constructed from bilinear pairings, lattices and ...
We introduce the first universally anonymous, thus key-private, IBE whose security is based on the s...
In the design of an identity-based encryption (IBE) scheme, the primary security assumptions center ...
This paper surveys the results obtained so far in designing identity-based encryption (IBE) schemes ...
Abstract. Three approaches are currently used for devising identity-based encryption schemes. They b...
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) ...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical...
Identity Based Encryption is a public key cryptosystem where the user’s identity becomes the public ...
We introduce the first universally anonymous, thus key-private, IBE whose security is based on the s...
In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an Identity-based Encryption ...
Efficient and privacy-preserving constructions for search functionality on encrypted data is importa...
The Cocks IBE Scheme was first proposed by Clifford Cocks in 2001 at the 8th IMA International Confe...
In this paper, we present a variant of Waters\u27 Identity-Based Encryption scheme with a much small...
Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbit...