Sciweavers

25 search results - page 2 / 5
» Identity-based encryption with efficient revocation
Sort
View
FOCS
2007
IEEE
13 years 9 months ago
Space-Efficient Identity Based Encryption Without Pairings
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) on elliptic curves. One exception is an elegant system due to Cocks which build...
Dan Boneh, Craig Gentry, Michael Hamburg
CANS
2006
Springer
106views Cryptology» more  CANS 2006»
13 years 9 months ago
Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi,...
EUROCRYPT
2004
Springer
13 years 9 months ago
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
An extended abstract of this paper appears in C. Cachin and J. Camenisch, editors, Advances in Cryptology-EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 22...
Dan Boneh, Xavier Boyen
EUROCRYPT
2006
Springer
13 years 9 months ago
Practical Identity-Based Encryption Without Random Oracles
We present an Identity Based Encryption (IBE) system that is fully secure in the standard model and has several advantages over previous such systems
Craig Gentry
ACISP
2006
Springer
13 years 9 months ago
Efficient Identity-Based Signatures Secure in the Standard Model
The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based si...
Kenneth G. Paterson, Jacob C. N. Schuldt