setup algorithm / identity-based e-mail systems / public key infrastructure / security systems / multiplicative / secure e-mail infrastructure / certificate management / satisfactory solutions / polynomial time algorithm / threshold systems / resistant hardware / elliptic curve systems / additive / e-mail systems / unrelated applications / /
Organization
National Science Foundation / Diffie-Hellman / Packard Foundation / /
Person
Matthew Franklin / Key Generator / /
Position
following IND-ID-CPA / IND-CPA / Private / assistant / polynomial time INDID-CPA / IND-ID-CPA / /
Product
Weil / ID1 / M0 / /
ProvinceOrState
California / /
PublishedMedium
Lecture Notes in Computer Science / /
Technology
three algorithms / public key infrastructure / randomized algorithm / related Public Key Encryption / polynomial time algorithm / PKI / setup algorithm / identity-based encryption / private key / ElGamal encryption / M. These algorithms / Encryption / cryptography / three party Diffie-Hellman protocol / public key / public key system / four algorithms / 4 Our Identity-Based Encryption / 3 2 Definitions Identity-Based Encryption / four randomized algorithms / Extract algorithm / using the public key / /