General Ad Hoc Encryption from Exponent Inversion IBE
From MaRDI portal
Publication:5429403
DOI10.1007/978-3-540-72540-4_23zbMATH Open1141.94343OpenAlexW2110569869MaRDI QIDQ5429403FDOQ5429403
Authors: Xavier Boyen
Publication date: 29 November 2007
Published in: Advances in Cryptology - EUROCRYPT 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-72540-4_23
Recommendations
- Generalized IBE in the exponent-inversion framework
- Efficient selective identity-based encryption without random oracles
- Identity-Based Encryption from the Weil Pairing
- Hierarchical Identity Based Encryption with Polynomially Many Levels
- Identity-based encryption and hierarchical identity-based encryption
Cited In (12)
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Generalized IBE in the exponent-inversion framework
- Efficient selective identity-based encryption without random oracles
- Attribute-based encryption schemes with constant-size ciphertexts
- Programmable hash functions and their applications
- Déjà Q: encore! Un petit IBE
- Programmable Hash Functions and Their Applications
- Distributed key generation for SM9-based systems
- Revocable hierarchical identity-based encryption with shorter private keys and update keys
- Boneh-Boyen IBE
- Chosen ciphertext secure fuzzy identity based encryption without ROM
- Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
This page was built for publication: General Ad Hoc Encryption from Exponent Inversion IBE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5429403)