A tapestry of identity-based encryption: practical frameworks compared
DOI10.1504/IJACT.2008.017047zbMATH Open1178.94001OpenAlexW2008948063WikidataQ122260014 ScholiaQ122260014MaRDI QIDQ2379112FDOQ2379112
Authors: Xavier Boyen
Publication date: 15 January 2009
Published in: International Journal of Applied Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1504/ijact.2008.017047
Recommendations
- Identity-Based Encryption from the Weil Pairing
- Survey of research on identity-based encryption
- scientific article; zbMATH DE number 1842494
- An identity-based encryption scheme with compact ciphertexts
- Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption
information securitybilinear pairingsidentity-based cryptographyidentity-based encryptiondata securityapplied cryptographyIBEcomparison survey
Data encryption (aspects in computer science) (68P25) Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02) Cryptography (94A60)
Cited In (12)
- An efficient IBE scheme with tight security reduction in the random oracle model
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
- Provably secure and pairing-based strong designated verifier signature scheme with message recovery
- A survey on functional encryption
- A Framework for Identity-Based Encryption with Almost Tight Security
- Distributed private-key generators for identity-based cryptography
- Towards lightweight anonymous entity authentication for IoT applications
- Survey of research on identity-based encryption
- Another look at tightness
- Adaptive-ID Secure Revocable Identity-Based Encryption
- On shortening ciphertexts: new constructions for compact public key and stateful encryption schemes
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
This page was built for publication: A tapestry of identity-based encryption: practical frameworks compared
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2379112)