Identity-based encryption and beyond

被引:3
|
作者
Martin, Luther
机构
关键词
D O I
10.1109/MSP.2008.120
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The US National Institute for Standards and Technology (NIST) held a workshop, entitled 'Applications of Pairing-Based Cryptography, Identity-Based Encryption and Beyond' in June, 2008, focused on some aspects of identity-based Encryption (IBE). The workshop organized a series of 14 talks and two panel discussions, focusing on several aspects of IBE and related pairing-based public-key schemes, including the history of the technology, different applications, and potential developments. The workshop was attended by around 100 participants from a wide range of security vendors, government agencies, and academic institutions. The participants gathered information that IBE uses public key technology, after retrieving a set of public parameters from a public parameter server (PPS), enabling users to calculate any public keys that they need.
引用
收藏
页码:62 / 64
页数:3
相关论文
共 50 条
  • [1] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [2] Wildcarded Identity-Based Encryption
    Michel Abdalla
    James Birkett
    Dario Catalano
    Alexander W. Dent
    John Malone-Lee
    Gregory Neven
    Jacob C. N. Schuldt
    Nigel P. Smart
    [J]. Journal of Cryptology, 2011, 24 : 42 - 82
  • [3] Idealizing Identity-Based Encryption
    Hofheinz, Dennis
    Matt, Christian
    Maurer, Ueli
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 495 - 520
  • [4] Fuzzy identity-based encryption
    Sahai, A
    Waters, B
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 457 - 473
  • [5] On the Anonymity of Identity-Based Encryption
    Luo, Song
    Hu, Ning
    [J]. JOURNAL OF APPLIED MATHEMATICS, 2013,
  • [6] Wildcarded Identity-Based Encryption
    Abdalla, Michel
    Birkett, James
    Catalano, Dario
    Dent, Alexander W.
    Malone-Lee, John
    Neven, Gregory
    Schuldt, Jacob C. N.
    Smart, Nigel P.
    [J]. JOURNAL OF CRYPTOLOGY, 2011, 24 (01) : 42 - 82
  • [7] On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption
    Wan, Zhong-Mei
    Weng, Jian
    Lai, Xue-Jia
    Liu, Sheng-Li
    Li, Ji-Guo
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (01) : 243 - 259
  • [8] Identity-Based Authenticated Encryption with Identity Confidentiality
    Zhao, Yunlei
    [J]. COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 633 - 653
  • [9] Anonymous Identity-Based Encryption with Identity Recovery
    Ma, Xuecheng
    Wang, Xin
    Lin, Dongdai
    [J]. INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 360 - 375
  • [10] Identity-based authenticated encryption with identity confidentiality
    Shen, Shiyu
    Wang, Hongbing
    Zhao, Yunlei
    [J]. THEORETICAL COMPUTER SCIENCE, 2022, 901 : 1 - 18