Sciweavers

80 search results - page 7 / 16
» An Identity Based Encryption Scheme Based on Quadratic Resid...
Sort
View
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
14 years 1 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase
JOC
2008
64views more  JOC 2008»
13 years 7 months ago
Generic Constructions of Identity-Based and Certificateless KEMs
We extend the concept of key encapsulation mechanisms to the primitives of ID-based and certificateless encryption. We show that the natural combination of ID-KEMs or CL-KEMs with ...
Kamel Bentahar, Pooya Farshim, John Malone-Lee, Ni...
PKC
2004
Springer
112views Cryptology» more  PKC 2004»
14 years 25 days ago
Identity-Based Threshold Decryption
Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Joonsang Baek, Yuliang Zheng
IJNSEC
2007
164views more  IJNSEC 2007»
13 years 7 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
CRYPTO
2007
Springer
130views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
Reducing Trust in the PKG in Identity Based Cryptosystems
One day, you suddenly find that a private key corresponding to your Identity is up for sale at e-Bay. Since you do not suspect a key compromise, perhaps it must be the PKG who is...
Vipul Goyal