Sciweavers

9 search results - page 1 / 2
» An object oriented approach to an identity based encryption ...
Sort
View
IASTEDSEA
2004
13 years 6 months ago
An object oriented approach to an identity based encryption cryptosystem
We describe an object oriented approach to developing an Identity Based Encryption system. We show how an existing API was reused and extended to facilitate our development of the...
Adam Duffy, Tom Dowling
CRYPTO
2007
Springer
130views Cryptology» more  CRYPTO 2007»
13 years 11 months ago
Reducing Trust in the PKG in Identity Based Cryptosystems
One day, you suddenly find that a private key corresponding to your Identity is up for sale at e-Bay. Since you do not suspect a key compromise, perhaps it must be the PKG who is...
Vipul Goyal
EUROCRYPT
2010
Springer
13 years 9 months ago
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...
APLAS
2004
ACM
13 years 10 months ago
A Relational Model for Object-Oriented Designs
This paper develops a mathematical characterisation of object-oriented concepts by defining an observation-oriented semantics for an object-oriented language (OOL) with a rich var...
Jifeng He, Zhiming Liu, Xiaoshan Li, Shengchao Qin
CCS
2005
ACM
13 years 10 months ago
Direct chosen ciphertext security from identity-based techniques
We describe a new encryption technique that is secure in the standard model against adaptive chosen ciphertext (CCA2) attacks. We base our method on two very efficient Identity-Ba...
Xavier Boyen, Qixiang Mei, Brent Waters