Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles

  title={Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles},
  author={Eike Kiltz and David Galindo},
We describe a new and practical identity-based key encapsulation mechanism that is secure in the standard model against chosen-ciphertext (CCA2) attacks. Since our construction is direct and not based on hierarchical identity-based encryption, it is more efficient than all previously proposed schemes. Furthermore, we give the first chosen-ciphertext secure identity-based key encapsulation mechanism with threshold key delegation and decryption in the standard model. 1 CWI Amsterdam, The… CONTINUE READING
Highly Cited
This paper has 22 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 12 extracted citations

A new proxy re-encryption scheme for protecting critical information systems

J. Ambient Intelligence and Humanized Computing • 2015
View 1 Excerpt

Public Verifiable Key Encapsulation Mechanism under Factoring

2013 5th International Conference on Intelligent Networking and Collaborative Systems • 2013
View 1 Excerpt

Efficient ID-based key agreement protocol under the DLDH assumption without random oracles

2008 International Symposium on Information Theory and Its Applications • 2008


Publications referenced by this paper.
Showing 1-10 of 53 references

Simple and efficient CCA2 security from IBE techniques

Xavier Boyen, Qixiang Mei, Brent Waters
In ACM Conference on Computer and Communications Security—CCS • 2005
View 9 Excerpts
Highly Influenced

Identity-Based Threshold Decryption

IACR Cryptology ePrint Archive • 2003
View 10 Excerpts
Highly Influenced

Hierarchical ID-Based Cryptography

IACR Cryptology ePrint Archive • 2002
View 7 Excerpts
Highly Influenced

Toward Hierarchical Identity-Based Encryption

View 6 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…