Skip to main content

Questions tagged [identity-based-encryption]

In identity-based encryption (IBE) the public key of a user $A$ is some identity string $ID_A$, e.g., an email address. To encrypt a message for this user there is no need to retrieve an authentic copy of the public key, as it is in public key cryptography, but one can simply use the identity string $ID_A$.

3 votes
1 answer
162 views

The following definitions are from Fuzzy Identity-based Encryption by Sahai and Waters (Eurocrypt 2005, Eprint). Definition 2 (Decisional Bilinear Diffie-Hellman (BDH) Assumption). Suppose a ...
Ky Phan Quoc's user avatar
2 votes
0 answers
75 views

Consider the paper From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security published by Abdalla, An, Bellare, Namprempre. In their ...
HyperPro's user avatar
  • 101
1 vote
0 answers
74 views

In certificateless cryptography, the KGC must ensure that the partial private keys are delivered securely to the correct entities. So my question is how KGC can send these keys secretly? In the other ...
ali alizade's user avatar
2 votes
1 answer
91 views

In Gentry's paper "Practical Identity-Based Encryption without Random Oracles", I have a little difficulty understanding the security proof part. The paper claims that in the Challenge phase:...
jhf's user avatar
  • 21
3 votes
1 answer
85 views

In the paper Dual system encryption: realizing fully secure IBE and HIBE under simple assumption (free PDF), the authors said "there is an apparent paradox in this strategy since it seems that ...
Alex Ideal's user avatar
0 votes
1 answer
124 views

Alice wants to send Bob a message. Both have well known public/private EC keys (PA, b, PB, <...
Erik Aronesty's user avatar
4 votes
1 answer
181 views

This question pertains to identity-based key encapsulation mechanisms (IB-KEMs). To recap the functionality: $\mathsf{KeyGen}(1^\lambda) \to (\mathsf{msk}, \mathsf{mpk})$ Generates the master keypair ...
rozbb's user avatar
  • 570
1 vote
1 answer
67 views

I am a developer with very little experience on the crypto part, and I'm looking for a secure solution (OTP Like) for identifying between client (browser) and server. this is what i need: Web Page at ...
Fabrizio Bellomo's user avatar
1 vote
1 answer
145 views

Identity Based Encryption is an asymmetric encryption scheme such that encryption uses the receiver's identity as the public key. Such a identity can be receiver's email address or some other string ...
zbo's user avatar
  • 75
2 votes
1 answer
582 views

I stumbled across this correctness of a scheme: $e(g^r, H(id)^x) = e(g^x, H(id))^r = e(g^x, H(id))^r$ and have a hard time following the properties of the bilinear pairing. Does anyone know the "...
Rory's user avatar
  • 353
0 votes
1 answer
54 views

I was just wondering how the private key generator should publish the master public key inside of an IBE system. This key is needed for all devices in the network to derive the public key of receiving ...
Alex Meyer's user avatar
1 vote
3 answers
215 views

Let's assume such a scenario. Person A will broadcast his public key and person B will broadcast his public key. They can now communicate. But let's say that suddenly another person C will write to ...
Krzysztofz01's user avatar
2 votes
2 answers
247 views

The PKG performs the following steps Choose $p,q \in \mathbb{P}$. Calculate $N=pq$. Calculate $\phi (n)=(p-1)(q-1)$. Choose $e$ with $gcd(e,\phi(n))=1$ and $1 < e < \phi(n)$. Let it be $e = {p^{...
marius's user avatar
  • 53
0 votes
1 answer
77 views

Although there are several proposals of ID-based PKC based on lattices, multivariate cryptography, I want to know why identity (ID) based PKC is not included in the NIST post-quantum competition. Is ...
PAMG's user avatar
  • 215
1 vote
0 answers
38 views

I'm looking for a IB-DS algorithm in the web. I found this one (if you know some other let me know). But I cannot figure out what the "identity" is. Better: I don't know if, in the section ...
Luigi2405's user avatar
  • 167

15 30 50 per page
1
2 3 4 5
8