The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based signatures. This folklore construction method leads to schemes that are somewhat inefficient and leaves open the problem of finding more efficient direct constructions. We present the first such construction. Our scheme is obtained from a modification of Waters\u27 recently proposed identity-based encryption scheme. It is computationally efficient and the signatures are short. The scheme\u27s security is proven in the standard model and rests on the hardness of the computational Diffie-Hellman problem in groups equipped with a pairing
We provide a construction for a group signature scheme that is provably secure in a universally comp...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...
To simplify the certificate management procedures, Shamir introduced the concept of identity-based c...
An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented ...
In this paper, we present a variant of Waters\u27 Identity-Based Encryption scheme with a much small...
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does...
Abstract. Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography...
We present a certificate-based encryption scheme which is fully secure in the standard model. Our sc...
In this paper, we propose an efficient identity-based identification (IBI) scheme provably secure ag...
MasterEncryption and signature have been considered the fundamental cryptographic tools of public ke...
Designing an ID based signcryption scheme in the standard model is among the most interesting and im...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
The identity-based signature, initially introduced by Shamir [Sha84], plays a fundamental role in th...
In traditional public key cryptography, public keys of users are essentially random strings generate...
We describe a practical identity-based encryption scheme that is secure in the standard model agains...
We provide a construction for a group signature scheme that is provably secure in a universally comp...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...
To simplify the certificate management procedures, Shamir introduced the concept of identity-based c...
An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented ...
In this paper, we present a variant of Waters\u27 Identity-Based Encryption scheme with a much small...
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does...
Abstract. Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography...
We present a certificate-based encryption scheme which is fully secure in the standard model. Our sc...
In this paper, we propose an efficient identity-based identification (IBI) scheme provably secure ag...
MasterEncryption and signature have been considered the fundamental cryptographic tools of public ke...
Designing an ID based signcryption scheme in the standard model is among the most interesting and im...
We present a new practical Identity-Based Encryption (IBE) system that can be another candidate for ...
The identity-based signature, initially introduced by Shamir [Sha84], plays a fundamental role in th...
In traditional public key cryptography, public keys of users are essentially random strings generate...
We describe a practical identity-based encryption scheme that is secure in the standard model agains...
We provide a construction for a group signature scheme that is provably secure in a universally comp...
We provide the first constructions of identity-based encryption and hierarchical identity-based encr...
To simplify the certificate management procedures, Shamir introduced the concept of identity-based c...