Boneh Franklin scheme

Results: 26



#Item
11Computational hardness assumptions / Diffie–Hellman key exchange / Diffie–Hellman problem / Weil pairing / ID-based encryption / Password authentication protocol / Public-key cryptography / Boneh/Franklin scheme / Cryptography / Cryptographic protocols / Finite fields

Improvement of Ma ni ke ta l .

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 05:56:33
12Mathematics / Multilinear algebra / Cryptography / Finite fields / Decision Linear assumption / Boneh/Franklin scheme / Group theory / Bilinear map / Decisional Diffie–Hellman assumption / Algebra / Computational hardness assumptions / Abstract algebra

The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions Brent Waters† University of Texas at Austin

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-06 19:27:51
13Semantic security / Cipher / RSA / Adaptive chosen-ciphertext attack / Boneh/Franklin scheme / Chosen-ciphertext attack / Key / Advantage / Cryptography / ID-based encryption / Public-key cryptography

Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application Yumiko Hanaoka∗, Goichiro Hanaoka†, Junji Shikata‡and Hideki Imai§ December 12, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-12 03:12:37
14ID-based encryption / Advantage / Paillier cryptosystem / Boneh/Franklin scheme / Random oracle / Cryptography / Public-key cryptography / Ciphertext indistinguishability

An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

Add to Reading List

Source URL: www.ippari.unict.it

Language: English - Date: 2009-01-08 04:52:18
15Elliptic curves / Analytic number theory / Elliptic curve / Group theory / Oracle machine / Boneh/Franklin scheme / Supersingular elliptic curve / Prime number / Algebraic curve / Abstract algebra / Cryptography / Mathematics

Efficient Indifferentiable Hashing into Ordinary Elliptic Curves⋆ Eric Brier1 , Jean-S´ebastien Coron2 , Thomas Icart2⋆⋆ , David Madore3 , Hugues Randriam3 , and Mehdi Tibouchi2,4⋆ ⋆ ⋆ 1 Ingenico

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-06-03 09:18:30
16Pairing / Boneh/Franklin scheme / Elliptic curve cryptography / Diffie–Hellman problem / Elliptic curve / ID-based encryption / Tate pairing / BLS / Supersingular elliptic curve / Cryptography / Abstract algebra / Algebra

An Introduction to Pairing-Based Cryptography Alfred Menezes Abstract. Bilinear pairings have been used to design ingenious protocols for such tasks as one-round three-party key agreement, identity-based encryption, and

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-10-27 06:53:30
17ID-based encryption / Semantic security / Chosen-plaintext attack / RSA / Advantage / Boneh/Franklin scheme / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / GMR / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions∗ Yang Cui1 , Eiichiro Fujisaki2 , Goichiro Hanaoka1 , Hideki Imai1,3 and Rui Zhang1 1 National Institute of Advanced Ind

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-10 22:37:01
18Mathematics / Boneh/Franklin scheme / Pairing / XTR / Supersingular elliptic curve / Elliptic curve / ID-based encryption / RSA / Weil pairing / Abstract algebra / Cryptography / Algebra

FAULT ATTACKS ON PAIRING-BASED PROTOCOLS REVISITED SANJIT CHATTERJEE, KORAY KARABINA, AND ALFRED MENEZES Abstract. Several papers have studied fault attacks on computing a pairing value e(P, Q), where P is a public point

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-06-20 19:35:34
19Cyberwarfare / Computer security / Security / RSA / Email encryption / Boneh/Franklin scheme / Cryptography / Public-key cryptography / ID-based encryption

Identity Based Encryption Terence Spies VP Engineering [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
20Electronic commerce / ID-based encryption / ID-based cryptography / Clifford Cocks / Key / RSA / Public key infrastructure / Boneh/Franklin scheme / Certificate-based encryption / Cryptography / Key management / Public-key cryptography

Identity-Based Encryption with Conventional Public-Key Cryptography

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-02-23 11:34:53
UPDATE