Identity-based encryption from the Weil pairing

D Boneh, M Franklin - Annual international cryptology conference, 2001 - Springer
… Interestingly, the related notions of identitybased signature … identity-based encryption scheme.
The performance of our system is comparable to the performance of ElGamal encryption in …

[图书][B] Identity-based encryption

S Chatterjee, P Sarkar - 2011 - books.google.com
… (IBE) is a type of public key encryption and has been intensely researched in the past decade.
Identity-Based Encryption summarizes the available research for IBE and the main ideas …

Fuzzy identity-based encryption

A Sahai, B Waters - Advances in Cryptology–EUROCRYPT 2005: 24th …, 2005 - Springer
… can be viewed as an Identity-Based Encryption of a message … fits the framework of
Identity-Based Encryption very well and … In standard Identity-Based Encryption schemes a user …

Identity-based encryption with efficient revocation

A Boldyreva, V Goyal, V Kumar - … of the 15th ACM conference on …, 2008 - dl.acm.org
… (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Pub…
the latter are sufficient to encrypt. Any setting, PKI- or identity-based, must provide a means …

Toward hierarchical identity-based encryption

J Horwitz, B Lynn - International conference on the theory and applications …, 2002 - Springer
We introduce the concept of hierarchical identity-based encryption (HIBE) schemes, give
precise definitions of their security and mention some applications. A two-level HIBE (2-HIBE) …

Proxy re-encryption systems for identity-based encryption

T Matsuo - Pairing-Based Cryptography–Pairing 2007: First …, 2007 - Springer
… key for Identity-Based Encryption, and the other one for the transformation from ciphertexts
… proxy re-encryption system. We propose the identity-based proxy re-encryption system in …

Practical identity-based encryption without random oracles

C Gentry - Advances in Cryptology-EUROCRYPT 2006: 24th …, 2006 - Springer
… We present an Identity Based Encryption (IBE) system that is fully secure in the standard
model and has several advantages over previous such systems – namely, computational …

Anonymous multireceiver identity-based encryption

CI Fan, LY Huang, PH Ho - IEEE Transactions on Computers, 2010 - ieeexplore.ieee.org
Recently, many multireceiver identity-based encryption schemes have been proposed in
the literature. However, none can protect the privacy of message receivers among these …

[Retracted] IIBE: An Improved IdentityBased Encryption Algorithm for WSN Security

CH Cao, YN Tang, DY Huang… - Security and …, 2021 - Wiley Online Library
… To solve the above problems, according to the characteristics of WSN and based on the
idea of identity-based encryption, an improved identity-based encryption algorithm (IIBE) is …

Chosen-ciphertext security from identity-based encryption

R Canetti, S Halevi, J Katz - … 2004: International Conference on the Theory …, 2004 - Springer
… secure public-key encryption scheme from any CPA-secure identity-based encryption (IBE) …
a new approach for constructing CCA-secure encryption schemes in the standard model. Our …