Fact-checked by Grok 2 weeks ago
References
-
[1]
[PDF] Identity-Based Encryption from the Weil PairingShamir, “Identity-based cryptosystems and signature schemes”, in Advances in Cryptology. – Crypto '84, Lecture Notes in Computer Science, Vol. 196, Springer ...<|separator|>
-
[2]
Identity-Based Cryptosystems and Signature Schemes - SpringerLinkDownload book PDF · Advances in Cryptology ... About this paper. Cite this paper. Shamir, A. (1985). Identity-Based Cryptosystems and Signature Schemes.
-
[3]
[PDF] TR 103 719 - V1.1.1 - Guide to Identity-Based Cryptography - ETSIMar 18, 2022 · The present document describes the use and application of Identity-Based Cryptography (IBC) applied to both encryption, as Identity-Based ...
-
[4]
[PDF] Identity Based Cryptography A Technical Review - IEOMThis Paper aims to have a comprehensive discussion on identity-based cryptography and aims to have a detail explanation on its technical aspect.
-
[5]
[PDF] Hierarchical ID-Based CryptographyShamir [15] proposed the idea of identity-based cryptography in 1984, and described an identity-based signature scheme in the same article. However, practical ...
-
[6]
New directions in cryptography | IEEE Journals & MagazineThis paper suggests ways to solve these currently open problems. It also discusses how the theories of communication and computation are beginning to provide ...
-
[7]
[PDF] Introduction to public key technology and the federal PKI infrastructureSep 13, 2021 · PKI integrates digital certificates, public key cryptography, and certification authorities into a complete enterprise-wide network security ...
-
[8]
RFC 5280 - Internet X.509 Public Key Infrastructure Certificate and ...1. Authority Key Identifier The authority key identifier extension provides a means of identifying the public key corresponding to the private key used to sign ...
-
[9]
[PDF] A Framework for Designing Cryptographic Key Management SystemsSection 11 Security Assessment discusses the security assessment of a CKMS. Section 12 Technology Challenges briefly discusses the technical challenges provided.
-
[10]
A method for obtaining digital signatures and public-key cryptosystemsFeb 1, 1978 · PDF. References. [1]. Diffie, W., and Hellman, M. New directions in cryptography. IEEE Trans. Inform. Theory IT-22, 6 (Nov. 1976), 644-654.<|control11|><|separator|>
-
[11]
[PDF] Identity-based Encryption Gone Wild - Cryptology ePrint ArchiveDec 3, 2006 · ii. Page 3. 1 Introduction. The concept of identity based cryptography was introduced by Shamir as early as in 1984 [Sha85]. How- ever, it took ...
-
[12]
[PDF] Identity-Based CryptosystemsShamir A ( ) Identity based cryptosystems and signature schemes. In: Advances in cryptology – Crypto ' . Lecture notes in computer science, vol ...
-
[13]
[PDF] New Directions in Cryptography - Stanford University[5] W. Diffie and M. E. Hellman, “Multiuser cryptographic techniques,” presented at National Computer Conference, New York, June 7-10,. 1976 ...
-
[14]
[PDF] Toward Hierarchical Identity-Based Encryption - Stanford CS TheoryWe introduce the concept of hierarchical identity-based en- cryption (HIBE) schemes, give precise definitions of their security and mention some applications. A ...
-
[15]
A Note on the Post-Quantum Security of Identity-Based Encryption ...Aug 7, 2025 · The development of cryptographic schemes which remain secure in the post-quantum era is an urgent challenge, particularly in light of the ...
-
[16]
[PDF] Reducing Trust in the PKG in Identity Based Cryptosystems[Sha84]. A. Shamir. Identity Based Cryptosystems and Signature Schemes. In Advances in Cryp- tology – CRYPTO, volume 196 of LNCS, pages 37–53.
-
[17]
[PDF] Domain-Based Administration of Identity-Based Cryptosystems for ...“master secret” – a global system secret held by a trusted third party known as a Private Key Generator, or PKG. Given the master secret, the PKG can derive ...
-
[18]
[PDF] Distributed Private-Key Generators for Identity-Based Cryptography*Further, a distributed PKG has not been considered for any other IBE scheme. In this paper, we design distributed PKG setup and private key extraction pro-.
-
[19]
RFC 5091 - Identity-Based Cryptography Standard (IBCS) #1This document describes the algorithms that implement Boneh-Franklin (BF) and Boneh-Boyen (BB1) Identity-based Encryption.
-
[20]
[PDF] Identity-Based Encryption from the Weil PairingWe propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming an elliptic ...
-
[21]
[PDF] Identity-Based SignaturesThis chapter gives an overview of the literature on identity- based signature (IBS) schemes, from Shamir's seminal scheme to the current state-of-the-art.
-
[22]
[PDF] Identity-based cryptosystems and signature schemes - of Luca GiuzziIDENTITY-BASED CRYPTOSYSTEMS AND SIGNATURE SCHEMES. THE IDEA. Adi Shamir. Department of Applied Mathematics. The Weizmann Institute of Science. Rehovot, 76100 ...
-
[23]
[PDF] Security Proofs for Identity-Based Identification and Signature ...The late eighties and early nineties saw the proposal of many IBI and IBS schemes. These include the Fiat-Shamir IBI and IBS schemes [FS86], the Guillou- ...Missing: Tatebayashi | Show results with:Tatebayashi
-
[24]
Efficient Identity-Based Encryption Without Random OraclesWe present the first efficient Identity-Based Encryption (IBE) scheme that is fully secure without random oracles.
-
[25]
Efficient Identity-Based Signatures Secure in the Standard ModelOur scheme is obtained from a modification of Waters' recently proposed identity-based encryption scheme. ... Hess, F.: Efficient identity based signature schemes ...
-
[26]
[PDF] Security Notions for Identity Based EncryptionAbstract. Identity Based Encryption (IBE) has attracted a lot of attention since the publica- tion of the scheme by Boneh and Franklin.
-
[27]
[PDF] Chosen-Ciphertext Security from Identity-Based EncryptionThis paper proposes a simple, efficient construction of CCA-secure public-key encryption from any CPA-secure identity-based encryption (IBE) scheme.
-
[28]
[PDF] Boneh-Franklin Identity Based Encryption RevisitedAbstract. The first practical identity based encryption (IBE) scheme was proposed by Boneh and Franklin in [BF03]. In this work we point.Missing: derivation | Show results with:derivation
-
[29]
[PDF] Efficient Identity-based Signatures Secure in the Standard Model[Sha84]. Adi Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO 84, pages 47–53,. 1984. [Wat05]. Brent Waters. Efficient identity-based ...
-
[30]
[PDF] An Identity Based Encryption Scheme based on Quadratic ResiduesClifford Cocks. Communications-Electronics Security Group, PO Box 144 ... This paper describes an identity based cryptosystem which uses quadratic ...
-
[31]
[PDF] Lattice-based CryptographyJul 22, 2008 · In this chapter we describe some of the recent progress in lattice-based cryptography. Lattice-based cryp- tographic constructions hold a ...
-
[32]
[PDF] Identity-Based Encryption from Lattices in the Standard ModelWe construct an Identity-Based Encryption (IBE) system without random oracles from hard problems on random integer lattices. The system is anonymous, with ...
-
[33]
[PDF] Towards Compact Identity-based Encryption on Ideal LatticesThis paper proposes a compact IBE on ideal lattices, addressing the inefficiency of existing schemes by introducing a modified gadget and efficient preimage ...Missing: original | Show results with:original
-
[34]
[PDF] Identity and Access Management for IoT in Smart GridAbstract A smart grid (SG) is a complex system that comprises distributed servers and Internet-of-Things (IoT) devices. IoT devices are resource-constrained ...
-
[35]
A provably secure identity-based access control scheme for ...Dec 30, 2024 · Tanveer et al. [12] presents a novel access control protocol aiming to enhance the security of resource-constrained IoT-enabled smart grid ...
-
[36]
[PDF] A Comparative Usability Study of Key Management in Secure EmailAug 14, 2018 · We previously created Private WebMail (Pwm) [27], a secure email system that tightly integrates with Gmail and uses identity-based encryption ( ...
-
[37]
[PDF] Identity-Based Cryptography for Cloud SecurityThen, Identity-Based Encryption (IBE) and Identity-Based Signature (IBS) for cloud computing are proposed. Finally, an Authentication Protocol for Cloud.Missing: Google prototypes<|separator|>
-
[38]
A V2V Identity Authentication and Key Agreement Scheme Based on ...Jan 3, 2023 · The V2V communication needs a low-bandwidth and low-latency security scheme [10]. ... Security in vehicular ad-hoc network with Identity-Based ...
-
[39]
Blockchain-Enabled Identity Based Authentication Scheme ... - MDPIIBC provides an identity-based encryption solution that reduces management overhead by directly generating public keys through the Key Generation Center (KGC), ...4. Authentication And Key... · 5.1. Blockchain Node Module... · 7. Experimental Evaluation
-
[40]
Privacy-preserving attribute-based access control using ...Jan 22, 2025 · This paper reviews the ABAC, homomorphic encryption (HE), and zero-knowledge proof (ZKP) approaches, confirming the gap in privacy preservation in ABAC.
-
[41]
Advances in authentication and security protocols for 5G networksJul 4, 2025 · We thoroughly analyze authentication and security mechanisms created expressly for 5G networks in this study.
-
[42]
[PDF] Identity-Based Encryption - CSRCIdentity-Based Encryption from the Weil Pairing. •. D. Boneh and M. Franklin. In Proceedings of. Crypto 2001, Lecture Notes in Computer. Science, Vol 2139, ...<|control11|><|separator|>
-
[43]
Identity-based Cryptography - ThalesIn 1984, Shamir proposed the idea of identity-based cryptography (IBC) where a user's public key can be his meaningful identities like names and email addresses ...Missing: motivation problems
-
[44]
[PDF] Hierarchical ID-Based CryptographyKeywords: identity-based cryptography, hierarchical identity-based cryptography, elliptic curves, pairings ... Improving efficiency of encryption: Levels 0 ...
-
[45]
Protocol-Based and Hybrid Access Control for the IoT: Approaches ...In this approach, identity-based cryptography (IBC) and attribute-based ... It integrates existing open standards (e.g., OAuth 2.0) and the device's ...
-
[46]
Identity-Based Cryptography on IoT devices: balancing security and ...Identity-Based Cryptography on IoT devices: balancing security and efficiency for modern use cases | IEEE Conference Publication | IEEE Xplore ...
-
[47]
[PDF] A New Efficient Identity-Based Encryption Without PairingTo compare the efficiency of the proposed scheme, we add our results to the ... Simple Identity-Based Cryptography with Mediated. RSA. In Cryptographers ...
-
[48]
High-Performance Implementation of the Identity-Based Signature ...Identity-based signature schemes usually contain bilinear pairings and elliptic curve arithmetic, which turn out to be the performance bottleneck in ...
-
[49]
[PDF] Reducing Trust in the PKG in Identity Based Cryptosystems[Sha84]. A. Shamir. Identity Based Cryptosystems and Signature Schemes. In Advances in Cryp- tology – CRYPTO, volume 196 of LNCS, pages 37–53.
-
[50]
[PDF] How to Construct Identity-Based Signatures without the Key Escrow ...In these identity-based cryptosystems, there is a trusted party called the private key gen- erator (PKG) who generates the secret key for each user identity.
-
[51]
[PDF] Asynchronous Distributed Private-Key Generators for Identity-Based ...Jun 29, 2010 · Distributed (shared) key generation is the most important com- ponent for distributed private-key generation in identity-based cryptography.
-
[52]
[PDF] Certificateless Public Key Signature Schemes from Standard ...CL-PKC is designed to have succinct public key management without certificates at the same time remove the key-escrow property embedded in the IBC. In CL-PKC, a ...
-
[53]
[PDF] SoK: Trusting Self-Sovereign IdentityThis lack of control raises concerns about potential privacy violations, misuse of identity data, and the possibility of the central author- ity gaining access ...Missing: regulations | Show results with:regulations
- [54]
-
[55]
[PDF] Identity-based Encryption with Efficient RevocationThe private keys of the users are issued by a trusted third party called the private key generator (PKG). Ideas of identity-based cryptography go back to 1984 ...
-
[56]
[PDF] Adaptive-ID Secure Revocable Identity-Based Encryption - HAL InriaAbstract. Identity-Based Encryption (IBE) offers an interesting alternative to PKI-enabled en- cryption as it eliminates the need for digital certificates.
-
[57]
Identity-based encryption with efficient revocation - ACM Digital LibraryIdentity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Public Key Infrastructure (PKI).Missing: incidents | Show results with:incidents
-
[58]
[PDF] Identity-based Encryption with Efficient RevocationTaking scal- ability of IBE deployment into account, we observe that for a very large number of users this may become a bottleneck. We note that alternatively, ...
-
[59]
An efficient and lightweight identity-based scheme for secure ...Therefore, IBC schemes based on pairing are considered slow and increase a computation overhead for sensor nodes compared with IBC schemes based on the elliptic ...
-
[60]
Adaptively Secure IBE from Lattices with Asymptotically Better ...Feb 17, 2025 · A new adaptively secure IBE scheme from lattices in the standard model, which improves the state-of-the-art construction proposed by Abla et al. (TCC 2021)
-
[61]
Revisiting Adaptively Secure IBE from Lattices with Smaller ModulusAug 12, 2025 · In this paper, we propose a novel framework for adaptively secure lattice-based IBE in the standard model, that removes this quadratic ...
-
[62]
An efficient lattice-based integrated revocable identity ... - NatureMay 14, 2025 · This paper introduces an integrated revocation model that maintains both the workload for the KGC and the size of the secret keys at a constant level.