Back to Results
First PageMeta Content
Intel Core / Cryptography / Boneh/Franklin scheme / ID-based encryption


Verifiable Security of Boneh-Franklin Identity-Based Encryption⋆ Gilles Barthe, Federico Olmedo, and Santiago Zanella B´eguelin {Gilles.Barthe,Federico.Olmedo,Santiago.Zanella}@imdea.org IMDEA Software Institute, Madr
Add to Reading List

Document Date: 2013-03-13 12:33:24


Open Document

File Size: 223,63 KB

Share Result on Facebook

City

Madrid / Introduction Identity / /

Company

Oracle / CertiCrypt / /

Country

Spain / /

Currency

pence / USD / /

/

Event

FDA Phase / /

Facility

IMDEA Software Institute / /

IndustryTerm

public-key systems / satisfactory solution / cryptographic systems / prominent applications / public-key infrastructure / extraction algorithm / /

OperatingSystem

L3 / /

Organization

Private Key Generator / G7 / IMDEA Software Institute / /

Person

Coq / Boneh / Franklin BasicIdent / Santiago Zanella B´eguelin / Federico Olmedo / Gilles Barthe / /

Position

Game GIND-ID-CPA / GIND-ID-CPA / AdvIND-ID-CPA / vP / AdvA IND-ID-CPA / general-purpose proof assistant / proof assistant / Adv BDH IND-ID-CPA / IND-ID-CPA / /

Product

G6 / qH1 / G4 / qH2 / /

ProgrammingLanguage

J / C / /

Technology

encryption / cryptography / OAEP encryption / iddentity-based encryption / 3.2 Identity-Based Encryption / Setup algorithm / Boneh-Franklin Identity-Based Encryption / Identity-based encryption / Private Key / dom / simulation / following algorithms / extraction algorithm / public-key infrastructure / /

SocialTag