Sciweavers

65 search results - page 2 / 13
» Space-Efficient Identity Based Encryption Without Pairings
Sort
View
CRYPTO
2001
Springer
134views Cryptology» more  CRYPTO 2001»
13 years 10 months ago
Identity-Based Encryption from the Weil Pairing
in SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer S...
Dan Boneh, Matthew K. Franklin
EUROCRYPT
2006
Springer
13 years 9 months ago
Practical Identity-Based Encryption Without Random Oracles
We present an Identity Based Encryption (IBE) system that is fully secure in the standard model and has several advantages over previous such systems
Craig Gentry
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
13 years 9 months ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters
EUROCRYPT
2004
Springer
13 years 9 months ago
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
An extended abstract of this paper appears in C. Cachin and J. Camenisch, editors, Advances in Cryptology-EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 22...
Dan Boneh, Xavier Boyen
PAIRING
2007
Springer
134views Cryptology» more  PAIRING 2007»
13 years 11 months ago
Proxy Re-encryption Systems for Identity-Based Encryption
A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice’s public key into the different ciphertexts that can be decrypted by Bob’s secret ...
Toshihiko Matsuo