Breaking an identity-based encryption scheme based on DHIES
From MaRDI portal
Publication:3104705
Recommendations
- Bounded-collusion IBE from key homomorphism
- scientific article; zbMATH DE number 2222202
- Cryptanalysis of two efficient HIBE schemes in the standard model
- Comment on ``A strong provably secure IBE scheme without bilinear map by M. Zheng, Y. Xiang and H. Zhou
- Security vulnerability in a non-interactive ID-based proxy re-encryption scheme
Cites work
- scientific article; zbMATH DE number 3857249 (Why is no real title available?)
- scientific article; zbMATH DE number 53883 (Why is no real title available?)
- scientific article; zbMATH DE number 2151220 (Why is no real title available?)
- A new efficient algorithm for computing Gröbner bases \((F_4)\)
- Comparison Between XL and Gröbner Basis Algorithms
- The Magma algebra system. I: The user language
Cited in
(5)- Comment on ``A strong provably secure IBE scheme without bilinear map by M. Zheng, Y. Xiang and H. Zhou
- Bounded-collusion IBE from key homomorphism
- scientific article; zbMATH DE number 2222202 (Why is no real title available?)
- Pitfalls in identity based encryption using an elliptic curve combined public key
- Security vulnerability in a non-interactive ID-based proxy re-encryption scheme
This page was built for publication: Breaking an identity-based encryption scheme based on DHIES
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3104705)