Back to Results
First PageMeta Content
Ciphertext indistinguishability / Semantic security / ElGamal encryption / Advantage / RSA / Cipher / Diffie–Hellman key exchange / XTR / Chosen-ciphertext attack / Cryptography / Public-key cryptography / ID-based encryption


Appears in SIAM J. of Computing, Vol. 32, No. 3, pp[removed], 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 213–229, Springer-Verlag, 2001.
Add to Reading List

Document Date: 2010-06-04 16:24:14


Open Document

File Size: 286,04 KB

Share Result on Facebook

City

Encrypt(params / our identity / Definitions Identity / /

Company

G1 / G. We / Gi / G2 / /

/

Event

FDA Phase / /

IndustryTerm

setup algorithm / identity-based e-mail systems / public key infrastructure / security systems / multiplicative / secure e-mail infrastructure / certificate management / satisfactory solutions / polynomial time algorithm / threshold systems / resistant hardware / elliptic curve systems / additive / e-mail systems / unrelated applications / /

Organization

National Science Foundation / Diffie-Hellman / Packard Foundation / /

Person

Matthew Franklin / Key Generator / /

Position

following IND-ID-CPA / IND-CPA / Private / assistant / polynomial time INDID-CPA / IND-ID-CPA / /

Product

Weil / ID1 / M0 / /

ProvinceOrState

California / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

three algorithms / public key infrastructure / randomized algorithm / related Public Key Encryption / polynomial time algorithm / PKI / setup algorithm / identity-based encryption / private key / ElGamal encryption / M. These algorithms / Encryption / cryptography / three party Diffie-Hellman protocol / public key / public key system / four algorithms / 4 Our Identity-Based Encryption / 3 2 Definitions Identity-Based Encryption / four randomized algorithms / Extract algorithm / using the public key / /

SocialTag