In this paper we show a relation between the notions of verifiable random functions (VRFs) and identity-based key encapsulation mechanisms (IB-KEMs). In particular, we propose a …
E Kiltz, D Galindo - Theoretical Computer Science, 2009 - Elsevier
We describe a practical identity-based encryption scheme that is secure in the standard model against chosen-ciphertext attacks. Our construction applies “direct chosen-ciphertext …
M Barbosa, P Farshim - Cryptography and Coding: 10th IMA International …, 2005 - Springer
We introduce the concept of identity based key encapsulation to multiple parties (mID-KEM), and define a security model for it. This concept is the identity based analogue of public key …
E Kiltz, D Galindo - Australasian conference on information security and …, 2006 - Springer
We describe a new and practical identity-based key encapsulation mechanism that is secure in the standard model against chosenciphertext (CCA2) attacks. Since our construction is …
X Boyen, Q Mei, B Waters - Proceedings of the 12th ACM conference on …, 2005 - dl.acm.org
We describe a new encryption technique that is secure in the standard model against chosen ciphertext attacks. We base our method on two very efficient Identity-Based …
We extend the concept of key encapsulation to the primitives of identity-based and certificateless encryption. We show that the natural combination of ID-KEMs or CL-KEMs …
The key escrow problem is one of the main barriers to the widespread real-world use of identity-based encryption (IBE). Specifically, a key generation center (KGC), which …
We introduce the concept of identity-based encryption (IBE) with master key-dependent chosen-plaintext (mKDM-sID-CPA) security. These are IBE schemes that remain secure …
B Libert, JJ Quisquater - … Third International Conference, ACNS 2005, New …, 2005 - Springer
This paper presents a first example of secure identity based encryption scheme (IBE) without redundancy in the sense of Phan and Pointcheval. This modification of the Boneh-Franklin …