Critical perspectives on provable security: Fifteen years of" another look" papers

N Koblitz, A Menezes - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Contents Page 1 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …

Identity-based cryptosystems and quadratic residuosity

M Joye - Public-Key Cryptography–PKC 2016: 19th IACR …, 2016 - Springer
Three approaches are currently used for devising identity-based encryption schemes. They
respectively build on pairings, quadratic residues (QR), and lattices. Among them, the QR …

On the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptography

FL Ţiplea, S Iftene, G Teşeleanu, AM Nica - Applied Mathematics and …, 2020 - Elsevier
We develop exact formulas for the distribution of quadratic residues and non-residues in
sets of the form a+ X={(a+ x) mod n∣ x∈ X}, where n is a prime or the product of two primes …

Anonymous IBE from quadratic residuosity with improved performance

M Clear, H Tewari, C McGoldrick - … in Africa, Marrakesh, Morocco, May 28 …, 2014 - Springer
Abstract Identity Based Encryption (IBE) has been constructed from bilinear pairings, lattices
and quadratic residuosity. The latter is an attractive basis for an IBE owing to the fact that it is …

Quantum identity-based encryption from the learning with errors problem

W Gao, L Yang, D Zhang, X Liu - Cryptography, 2022 - mdpi.com
To prevent eavesdropping and tampering, network security protocols take advantage of
asymmetric ciphers to establish session-specific shared keys with which further …

Jhanwar-Barua's identity-based encryption revisited

I Elashry, Y Mu, W Susilo - … Conference on Network and System Security, 2015 - Springer
Abstract In FOCS'07, Boneh, Gentry and Hamburg presented an identity-based encryption
(IBE) system (BasicIBE) based on the quadratic residuosity (QR) assumption. A BasicIBE …

Cryptanalysis of an identity‐based authenticated key exchange protocol

Y Hatri, A Otmani, K Guenda - International Journal of …, 2018 - Wiley Online Library
Authenticated key exchange protocols represent an important cryptographic mechanism that
enables several parties to communicate securely over an open network. Elashry, Mu, and …

An efficient variant of Boneh-Gentry-Hamburg's identity-based encryption without pairing

I Elashry, Y Mu, W Susilo - International Workshop on Information Security …, 2014 - Springer
Abstract Boneh, Gentry and Hamburg presented an encryption system known as BasicIBE
without incorporating pairings. This system has short ciphertext size but this comes at the …

Elementary Remarks on Some Quadratic Based Identity Based Encryption Schemes

G Teseleanu, P Cotan - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In the design of an identity-based encryption (IBE) scheme, the primary security assumptions
center around quadratic residues, bilinear mappings, and lattices. Among these …

On the security of Jhanwar-Barua identity-based encryption scheme

AG Schipor - … Security Solutions for Information Technology and …, 2019 - Springer
Abstract In 3, Jhanwar and Barua presented an improvement of the Boneh-Gentry-Hamburg
(BGH) scheme. In addition to reducing the time complexity of the algorithm to find a solution …