Identity-Based Encryption from the Weil Pairing

From MaRDI portal
Publication:4706220

DOI10.1137/S0097539701398521zbMath1046.94008OpenAlexW2086042811WikidataQ55952479 ScholiaQ55952479MaRDI QIDQ4706220

Dan Boneh, Matthew Franklin

Publication date: 19 June 2003

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1137/s0097539701398521




Related Items (only showing first 100 items - show all)

Identity-based re-encryption scheme with lightweight re-encryption key generationAnother Look at TightnessModeling Distributed Private Key Generation by Composing Petri NetsSequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oraclesPredicate encryption supporting disjunctions, polynomial equations, and inner productsTrapdoors for Ideal Lattices with ApplicationsTowards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over $\mathbb{F}_{2^{1223}}$Constant-Round Maliciously Secure Two-Party Computation in the RAM ModelCommunication Complexity of Conditional Disclosure of Secrets and Attribute-Based EncryptionFrom Selective to Adaptive Security in Functional EncryptionA cryptographic primitive based on hidden-order groupsEfficient pairing computation on supersingular abelian varietiesSurvey of information securityCertificateless Proxy Re-Encryption Without PairingsEasy Decision Diffie-Hellman GroupsSomewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryptionA unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemesPublic-key authenticated encryption with keyword search revisited: security model and constructionsAn efficient RSA-based certificateless public key encryption schemeFailure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based CryptographyOn the Anonymization of Cocks IBE SchemeEfficient Statically-Secure Large-Universe Multi-Authority Attribute-Based EncryptionVerifiable Functional EncryptionEfficient Asymmetric Index Encapsulation Scheme for Named DataCCA2-Secure Threshold Broadcast Encryption with Shorter CiphertextsConstruction of a Hybrid HIBE Protocol Secure Against Adaptive AttacksGeneric constructions of identity-based and certificateless kEMsPolynomial approximation of bilinear Diffie-Hellman mapsSecure multi-party convex hull protocol based on quantum homomorphic encryptionWildcarded identity-based encryptionImproved hidden vector encryption with short ciphertexts and tokensElliptic curve cryptography: the serpentine course of a paradigm shiftAdaptively secure inner product encryption from LWEIncremental symmetric puncturable encryption with support for unbounded number of puncturesHeuristics of the Cocks-Pinch methodReflections on the security proofs of Boneh-Franklin identity-based encryption schemeA simple deniable authentication protocol based on the Diffie–Hellman algorithmLeakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability ObfuscationImprovement on Meshram et al.'s ID-based cryptographic mechanismAn Identity-Based Key Agreement Protocol for the Network LayerNew Communication-Efficient Oblivious Transfer Protocols Based on PairingsDesign of improved password authentication and update scheme based on elliptic curve cryptographyChosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertextsCertificateless threshold cryptosystem secure against chosen-ciphertext attackIdentity-based ring signatures from RSACertificateless undeniable signature schemeA novel ID-based designated verifier signature schemeAdaptively Secure Non-interactive Threshold CryptosystemsRevocable Identity-Based Encryption Revisited: Security Model and ConstructionEfficient Certificateless KEM in the Standard ModelFactor-4 and 6 compression of cyclotomic subgroups of andProvably secure non-interactive key distribution based on pairingsGenerating more MNT elliptic curvesEfficient computation of roots in finite fieldsPractical Identity-Based Encryption Without Random OraclesGeneralized Identity Based and Broadcast Encryption SchemesConstructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic PolynomialsPairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y 2 = x 5 + axPairing Computation on Twisted Edwards Form Elliptic CurvesExponentiation in Pairing-Friendly Groups Using HomomorphismsSpeeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable AutomorphismsFaster Implementation of η T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-AdditionProtecting against key-exposure: strongly key-insulated encryption with optimal thresholdRevisiting Pairing Based Group Key ExchangeRevocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short CiphertextsCertificate-Based Signatures: New Definitions and a Generic Construction from Certificateless SignaturesLower Bounds on Assumptions Behind Indistinguishability ObfuscationAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographySecure administration of cryptographic role-based access control for large-scale cloud storage systemsDéjà Q: Encore! Un Petit IBEHIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLESOn Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption SchemesAttribute-Based SignaturesA Privacy-Preserving ID-Based Group Key Agreement Scheme Applied in VPANAdaptive-ID Secure Revocable Identity-Based EncryptionUniversally Anonymous IBE Based on the Quadratic Residuosity AssumptionBreaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive OpeningAsymmetric Group Key AgreementContent-Based EncryptionIdentity-Based Group EncryptionA Schnorr-Like Lightweight Identity-Based Signature SchemeCertified Encryption RevisitedVerifiable Security of Boneh-Franklin Identity-Based EncryptionFully Distributed Broadcast EncryptionGeneralized Learning Problems and Applications to Non-commutative CryptographyFaster Pairings on Special Weierstrass CurvesStrongly Secure Certificateless Key AgreementFunctional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negationEfficient Pairing Computation on Genus 2 Curves in Projective CoordinatesFully Secure Functional Encryption for Inner Products, from Standard AssumptionsStrong Forward Security in Identity-Based SigncryptionPublicly Verifiable Secret Sharing for Cloud-Based Key ManagementRobust EncryptionNote on families of pairing-friendly elliptic curves with small embedding degreeA group key agreement protocol from pairingsOn Small Characteristic Algebraic Tori in Pairing-Based CryptographyComputing on authenticated dataPrivacy-preserving encryption scheme using DNA parentage testExplicit formula for optimal ate pairing over cyclotomic family of elliptic curvesThe multiple number field sieve for medium- and high-characteristic finite fields




This page was built for publication: Identity-Based Encryption from the Weil Pairing