Identity-based encryption from the Weil pairing
D Boneh, M Franklin - Annual international cryptology conference, 2001 - Springer
… Interestingly, the related notions of identitybased signature … identity-based encryption scheme.
The performance of our system is comparable to the performance of ElGamal encryption in …
The performance of our system is comparable to the performance of ElGamal encryption in …
[图书][B] Identity-based encryption
S Chatterjee, P Sarkar - 2011 - books.google.com
… (IBE) is a type of public key encryption and has been intensely researched in the past decade.
Identity-Based Encryption summarizes the available research for IBE and the main ideas …
Identity-Based Encryption summarizes the available research for IBE and the main ideas …
Fuzzy identity-based encryption
… can be viewed as an Identity-Based Encryption of a message … fits the framework of
Identity-Based Encryption very well and … In standard Identity-Based Encryption schemes a user …
Identity-Based Encryption very well and … In standard Identity-Based Encryption schemes a user …
Identity-based encryption with efficient revocation
… (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Pub…
the latter are sufficient to encrypt. Any setting, PKI- or identity-based, must provide a means …
the latter are sufficient to encrypt. Any setting, PKI- or identity-based, must provide a means …
Toward hierarchical identity-based encryption
J Horwitz, B Lynn - International conference on the theory and applications …, 2002 - Springer
We introduce the concept of hierarchical identity-based encryption (HIBE) schemes, give
precise definitions of their security and mention some applications. A two-level HIBE (2-HIBE) …
precise definitions of their security and mention some applications. A two-level HIBE (2-HIBE) …
Proxy re-encryption systems for identity-based encryption
T Matsuo - Pairing-Based Cryptography–Pairing 2007: First …, 2007 - Springer
… key for Identity-Based Encryption, and the other one for the transformation from ciphertexts
… proxy re-encryption system. We propose the identity-based proxy re-encryption system in …
… proxy re-encryption system. We propose the identity-based proxy re-encryption system in …
Practical identity-based encryption without random oracles
C Gentry - Advances in Cryptology-EUROCRYPT 2006: 24th …, 2006 - Springer
… We present an Identity Based Encryption (IBE) system that is fully secure in the standard
model and has several advantages over previous such systems – namely, computational …
model and has several advantages over previous such systems – namely, computational …
Anonymous multireceiver identity-based encryption
CI Fan, LY Huang, PH Ho - IEEE Transactions on Computers, 2010 - ieeexplore.ieee.org
Recently, many multireceiver identity-based encryption schemes have been proposed in
the literature. However, none can protect the privacy of message receivers among these …
the literature. However, none can protect the privacy of message receivers among these …
[Retracted] IIBE: An Improved Identity‐Based Encryption Algorithm for WSN Security
CH Cao, YN Tang, DY Huang… - Security and …, 2021 - Wiley Online Library
… To solve the above problems, according to the characteristics of WSN and based on the
idea of identity-based encryption, an improved identity-based encryption algorithm (IIBE) is …
idea of identity-based encryption, an improved identity-based encryption algorithm (IIBE) is …
Chosen-ciphertext security from identity-based encryption
… secure public-key encryption scheme from any CPA-secure identity-based encryption (IBE) …
a new approach for constructing CCA-secure encryption schemes in the standard model. Our …
a new approach for constructing CCA-secure encryption schemes in the standard model. Our …