Sciweavers

139 search results - page 4 / 28
» Identity-based Threshold Signature Secure in the Standard Mo...
Sort
View
EUC
2008
Springer
14 years 11 months ago
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
Abstract. Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously. Recently in May 2008, a scheme for identity based thre...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
CRYPTO
2004
Springer
138views Cryptology» more  CRYPTO 2004»
15 years 2 months ago
Secure Identity Based Encryption Without Random Oracles
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model. Selective identity secure IBE is a slightly w...
Dan Boneh, Xavier Boyen
CTRSA
2004
Springer
120views Cryptology» more  CTRSA 2004»
15 years 2 months ago
Identity Based Undeniable Signatures
Abstract. In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security m...
Benoît Libert, Jean-Jacques Quisquater
CRYPTO
2012
Springer
222views Cryptology» more  CRYPTO 2012»
12 years 12 months ago
Secure Identity-Based Encryption in the Quantum Random Oracle Model
We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model ...
Mark Zhandry
EUROCRYPT
2006
Springer
15 years 1 months ago
Practical Identity-Based Encryption Without Random Oracles
We present an Identity Based Encryption (IBE) system that is fully secure in the standard model and has several advantages over previous such systems
Craig Gentry