k-Resilient Identity-Based Encryption in the Standard Model
We present and analyze an adaptive chosen ciphertext secure (IND-CCA) identity-based encryption scheme (IBE) based on the well studied Decisional Diffie-Hellman (DDH) assumption. The scheme is provably secure in the standard model assuming the adversary can corrupt up to a maximum of k users adaptiv...
| Main Author: | |
|---|---|
| Format: | Article |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2013/ |
| _version_ | 1848789939583451136 |
|---|---|
| author | HENG, S.-H. |
| author_facet | HENG, S.-H. |
| author_sort | HENG, S.-H. |
| building | MMU Institutional Repository |
| collection | Online Access |
| description | We present and analyze an adaptive chosen ciphertext secure (IND-CCA) identity-based encryption scheme (IBE) based on the well studied Decisional Diffie-Hellman (DDH) assumption. The scheme is provably secure in the standard model assuming the adversary can corrupt up to a maximum of k users adaptively. This is contrary to the Boneh-Franklin scheme which holds in the random-oracle model. |
| first_indexed | 2025-11-14T18:04:41Z |
| format | Article |
| id | mmu-2013 |
| institution | Multimedia University |
| institution_category | Local University |
| last_indexed | 2025-11-14T18:04:41Z |
| publishDate | 2006 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | mmu-20132011-08-10T07:20:04Z http://shdl.mmu.edu.my/2013/ k-Resilient Identity-Based Encryption in the Standard Model HENG, S.-H. QA75.5-76.95 Electronic computers. Computer science We present and analyze an adaptive chosen ciphertext secure (IND-CCA) identity-based encryption scheme (IBE) based on the well studied Decisional Diffie-Hellman (DDH) assumption. The scheme is provably secure in the standard model assuming the adversary can corrupt up to a maximum of k users adaptively. This is contrary to the Boneh-Franklin scheme which holds in the random-oracle model. 2006-01 Article NonPeerReviewed HENG, S.-H. (2006) k-Resilient Identity-Based Encryption in the Standard Model. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E89-A (1). pp. 39-46. ISSN 0916-8508 http://dx.doi.org/10.1093/ietfec/e89-a.1.39 doi:10.1093/ietfec/e89-a.1.39 doi:10.1093/ietfec/e89-a.1.39 |
| spellingShingle | QA75.5-76.95 Electronic computers. Computer science HENG, S.-H. k-Resilient Identity-Based Encryption in the Standard Model |
| title | k-Resilient Identity-Based Encryption in the Standard Model |
| title_full | k-Resilient Identity-Based Encryption in the Standard Model |
| title_fullStr | k-Resilient Identity-Based Encryption in the Standard Model |
| title_full_unstemmed | k-Resilient Identity-Based Encryption in the Standard Model |
| title_short | k-Resilient Identity-Based Encryption in the Standard Model |
| title_sort | k-resilient identity-based encryption in the standard model |
| topic | QA75.5-76.95 Electronic computers. Computer science |
| url | http://shdl.mmu.edu.my/2013/ http://shdl.mmu.edu.my/2013/ http://shdl.mmu.edu.my/2013/ |