Back to Results
First PageMeta Content
Public-key cryptography / Key encapsulation / Ciphertext indistinguishability / Cipher / Cryptographic protocol / Semantic security / Key / Standard model / Transport Layer Security / Cryptography / ID-based encryption / Advantage


Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement Dario Fiore1? , Rosario Gennaro2 , and Nigel P. Smart3 ´ Ecole Normale Sup´erieure,
Add to Reading List

Document Date: 2010-08-30 11:15:58


Open Document

File Size: 271,51 KB

Share Result on Facebook

City

Bristol / Paris / /

Company

IBM / /

Country

Italy / France / United Kingdom / /

/

Event

FDA Phase / /

Facility

IBM T.J.Watson Research Center / University of Catania / University of Bristol / /

IndustryTerm

deterministic decapsulation algorithm / polynomial time algorithms / agreement protocols / non-pure protocols / role-symmetric protocols / encapsulation algorithm / possible applications / agreement protocol / identity-based key agreement protocol / private key extraction algorithm / deterministic algorithm / /

Organization

University of Catania / R. There / University of Bristol / R. / Ecole Normale Sup´erieure / I. Initiator Responder dI / Key Generation Center / /

Position

Weak Type-I-CPA / CPA / security model for certificateless encryption / Private / ID-IND-CPA / /

Product

Bellare / Reveal / CCA2 / R0 / Rewind / Fiore / /

TVStation

KGCs / /

Technology

deterministic decapsulation algorithm / pure and non-pure ID-based key agreement protocols / pairing-based protocols / secure ID-KA protocol / underlying ID-KA protocol / Set-Private-Key algorithms / SCK protocols / role-symmetric protocols / secure KEMs/encryption / PKI / key agreement protocol / all pure ID-based key agreement protocols / FG protocol / identity-based encryption / private key / modelling two-pass protocols / secret key / identity-based key agreement protocol / key agreement protocols / ID-Based Encryption / Kudla protocol / two-pass protocols / SSL / Set-Public-Key algorithm / converting ID-based key agreement protocols / Encryption / two pass ID-based key agreement protocols / ID-based key agreement protocols / Set-User-Keys algorithm / PPT algorithm / public key / PPT encapsulation algorithm / six algorithms / ID-KA protocols / ID-based key agreement protocol / non-pure protocols / Station-toStation protocol / deterministic algorithm / pure ID-based KA protocol / seven polynomial time algorithms / private key extraction algorithm / pairing-based ID-based key agreement protocols / /

SocialTag