Breaking an identity-based encryption scheme based on DHIES
From MaRDI portal
Publication:3104705
DOI10.1007/978-3-642-25516-8_21zbMATH Open1291.94042OpenAlexW9275675MaRDI QIDQ3104705FDOQ3104705
Authors: Martin R. Albrecht, Kenneth G. Paterson
Publication date: 16 December 2011
Published in: Cryptography and Coding (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25516-8_21
Recommendations
- Bounded-collusion IBE from key homomorphism
- scientific article; zbMATH DE number 2222202
- Cryptanalysis of two efficient HIBE schemes in the standard model
- Comment on ``A strong provably secure IBE scheme without bilinear map by M. Zheng, Y. Xiang and H. Zhou
- Security vulnerability in a non-interactive ID-based proxy re-encryption scheme
Cryptography (94A60) Gröbner bases; other bases for ideals and modules (e.g., Janet and border bases) (13P10)
Cites Work
Cited In (5)
- Comment on ``A strong provably secure IBE scheme without bilinear map by M. Zheng, Y. Xiang and H. Zhou
- Security vulnerability in a non-interactive ID-based proxy re-encryption scheme
- Title not available (Why is that?)
- Pitfalls in identity based encryption using an elliptic curve combined public key
- Bounded-collusion IBE from key homomorphism
Uses Software
This page was built for publication: Breaking an identity-based encryption scheme based on DHIES
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3104705)