Verifiable random functions from identity-based key encapsulation

M Abdalla, D Catalano, D Fiore - … on the Theory and Applications of …, 2009 - Springer
We propose a methodology to construct verifiable random functions from a class of identity
based key encapsulation mechanisms (IB-KEM) that we call VRF suitable. Informally, an IB …

Verifiable random functions: Relations to identity-based key encapsulation and new constructions

M Abdalla, D Catalano, D Fiore - Journal of Cryptology, 2014 - Springer
In this paper we show a relation between the notions of verifiable random functions (VRFs)
and identity-based key encapsulation mechanisms (IB-KEMs). In particular, we propose a …

Direct chosen-ciphertext secure identity-based key encapsulation without random oracles

E Kiltz, D Galindo - Theoretical Computer Science, 2009 - Elsevier
We describe a practical identity-based encryption scheme that is secure in the standard
model against chosen-ciphertext attacks. Our construction applies “direct chosen-ciphertext …

Efficient identity-based key encapsulation to multiple parties

M Barbosa, P Farshim - Cryptography and Coding: 10th IMA International …, 2005 - Springer
We introduce the concept of identity based key encapsulation to multiple parties (mID-KEM),
and define a security model for it. This concept is the identity based analogue of public key …

Direct chosen-ciphertext secure identity-based key encapsulation without random oracles

E Kiltz, D Galindo - Australasian conference on information security and …, 2006 - Springer
We describe a new and practical identity-based key encapsulation mechanism that is secure
in the standard model against chosenciphertext (CCA2) attacks. Since our construction is …

Direct chosen ciphertext security from identity-based techniques

X Boyen, Q Mei, B Waters - Proceedings of the 12th ACM conference on …, 2005 - dl.acm.org
We describe a new encryption technique that is secure in the standard model against
chosen ciphertext attacks. We base our method on two very efficient Identity-Based …

Generic constructions of identity-based and certificateless KEMs

K Bentahar, P Farshim, J Malone-Lee, NP Smart - Journal of Cryptology, 2008 - Springer
We extend the concept of key encapsulation to the primitives of identity-based and
certificateless encryption. We show that the natural combination of ID-KEMs or CL-KEMs …

Identity-based encryption with security against the KGC: A formal model and its instantiations

K Emura, S Katsumata, Y Watanabe - Theoretical Computer Science, 2022 - Elsevier
The key escrow problem is one of the main barriers to the widespread real-world use of
identity-based encryption (IBE). Specifically, a key generation center (KGC), which …

Identity-based encryption with master key-dependent message security and leakage-resilience

D Galindo, J Herranz, J Villar - European Symposium on Research in …, 2012 - Springer
We introduce the concept of identity-based encryption (IBE) with master key-dependent
chosen-plaintext (mKDM-sID-CPA) security. These are IBE schemes that remain secure …

Identity based encryption without redundancy

B Libert, JJ Quisquater - … Third International Conference, ACNS 2005, New …, 2005 - Springer
This paper presents a first example of secure identity based encryption scheme (IBE) without
redundancy in the sense of Phan and Pointcheval. This modification of the Boneh-Franklin …