Sciweavers

215 search results - page 3 / 43
» Efficient Identity-Based Signatures Secure in the Standard M...
Sort
View
INFORMATICALT
2010
92views more  INFORMATICALT 2010»
13 years 4 months ago
New Fuzzy Identity-Based Encryption in the Standard Model
In a fuzzy identity-based encryption (IBE) scheme, a user with the secret key for an identity ID is able to decrypt a ciphertext encrypted with another identity ID if and only if I...
Yanli Ren, Dawu Gu, Shuozhong Wang, Xinpeng Zhang
FC
2004
Springer
120views Cryptology» more  FC 2004»
13 years 11 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
ACISP
2005
Springer
13 years 11 months ago
Group Signature Where Group Manager, Members and Open Authority Are Identity-Based
We present the first group signature scheme with provable security and signature size O(λ) bits where the group manager, the group members, and the Open Authority (OA) are all id...
Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang
CRYPTO
2004
Springer
138views Cryptology» more  CRYPTO 2004»
13 years 11 months ago
Secure Identity Based Encryption Without Random Oracles
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model. Selective identity secure IBE is a slightly w...
Dan Boneh, Xavier Boyen
CTRSA
2004
Springer
120views Cryptology» more  CTRSA 2004»
13 years 11 months ago
Identity Based Undeniable Signatures
Abstract. In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security m...
Benoît Libert, Jean-Jacques Quisquater