Sciweavers

174 search results - page 5 / 35
» Secure Identity Based Encryption Without Random Oracles
Sort
View
PKC
2007
Springer
129views Cryptology» more  PKC 2007»
15 years 3 months ago
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how to use it to convert threemove identification protocols into two-tier signatur...
Mihir Bellare, Sarah Shoup
88
Voted
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 3 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
JISE
2008
89views more  JISE 2008»
14 years 9 months ago
Identity-Based Parallel Key-Insulated Signature Without Random Oracles
Jian Weng, Xiangxue Li, Kefei Chen, Shengli Liu
ICCSA
2007
Springer
15 years 3 months ago
Public Key Encryption with Keyword Search Based on K-Resilient IBE
An encrypted email is sent from Bob to Alice. A gateway wants to check whether a certain keyword exists in an email or not for some reason (e.g. routing). Nevertheless Alice does n...
Dalia Khader
91
Voted
ACNS
2009
Springer
147views Cryptology» more  ACNS 2009»
14 years 7 months ago
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions
In this paper, we propose a notion of threshold tag-based encryption schemes that simplifies the notion of threshold identity-based encryption schemes, and we show a conversion fro...
Seiko Arita, Koji Tsurudome