Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model

@article{Ren2008EfficientHI,
  title={Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model},
  author={Yanli Ren and Dawu Gu},
  journal={Informatica (Slovenia)},
  year={2008},
  volume={32},
  pages={207-211}
}
Constructing identity based schemes is one of the hot topics of current cryptography. Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root public key generator to distribute the workload by delegating public key generation and identity authentication to lower-level public key generators. Currently, there is no hierarchical identity based encryption scheme that is fully secure in the standard model… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 11 references

Practical Identity-Based Encryption Without Random Oracles

EUROCRYPT • 2006
View 3 Excerpts
Highly Influenced

Efficient identity-based encryption without random oracles

IACR Cryptology ePrint Archive • 2004
View 1 Excerpt

Hierarchical ID-Based Cryptography

IACR Cryptology ePrint Archive • 2002
View 2 Excerpts

Similar Papers

Loading similar papers…