Identity-based encryption from the Weil pairing

被引:4218
|
作者
Boneh, D [1 ]
Franklin, M
机构
[1] Stanford Univ, Dept Comp Sci, Stanford, CA 94305 USA
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
关键词
identity-based encryption; bilinear maps; Weil pairing; Tate pairing; elliptic curve cryptography; escrow ElGamal;
D O I
10.1137/S0097539701398521
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a fully functional identity-based encryption (IBE) scheme. The scheme has chosen ciphertext security in the random oracle model assuming a variant of the computational Diffie-Hellman problem. Our system is based on bilinear maps between groups. The Weil pairing on elliptic curves is an example of such a map. We give precise definitions for secure IBE schemes and give several applications for such systems.
引用
收藏
页码:586 / 615
页数:30
相关论文
共 50 条
  • [1] An identity-based signature scheme from the Weil pairing
    Yi, X
    [J]. IEEE COMMUNICATIONS LETTERS, 2003, 7 (02) : 76 - 78
  • [2] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [3] Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices
    Guo, Fuchun
    Mu, Yi
    Susilo, Willy
    Hsing, Homer
    Wong, Duncan S.
    Varadharajan, Vijay
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (02) : 211 - 220
  • [4] Identity-based authenticated key agreement protocol based on Weil pairing
    Smart, NP
    [J]. ELECTRONICS LETTERS, 2002, 38 (13) : 630 - 632
  • [5] Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption
    Lu, Yang
    Li, Jiguo
    [J]. 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 199 - 202
  • [6] Subgroup operations in identity based encryption using weil pairing for decentralized networks
    Kumar, N. Chaitanya
    Basit, Abdul
    Singh, Priyadarshi
    Venkaiah, V.C.
    [J]. International Journal of Network Security, 2019, 21 (06): : 930 - 936
  • [7] Wildcarded identity-based encryption from lattices
    Minh Thuy Truc Pham
    Ngoc Ai Van Nguyen
    Jiang, Mei
    Dung Hoang Duong
    Susilo, Willy
    [J]. THEORETICAL COMPUTER SCIENCE, 2022, 902 : 41 - 53
  • [8] Efficient Identity-Based Encryption from LWR
    Cheon, Jung Hee
    Cho, Haejin
    Jung, Jaewook
    Lee, Joohee
    Lee, Keewoo
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 225 - 241
  • [9] Puncturable Identity-Based Encryption from Lattices
    Dutta, Priyanka
    Susilo, Willy
    Duong, Dung Hoang
    Roy, Partha Sarathi
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 571 - 589
  • [10] Efficient Identity-based Encryption from Lattice
    Chen, Huiyan
    Chen, Dongmei
    Zhang, Yanshuo
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, : 84 - 90