Wildcarded Identity-Based Encryption

@article{Abdalla2010WildcardedIE,
  title={Wildcarded Identity-Based Encryption},
  author={M. Abdalla and J. Birkett and D. Catalano and A. W. Dent and J. Malone-Lee and G. Neven and J. Schuldt and N. Smart},
  journal={Journal of Cryptology},
  year={2010},
  volume={24},
  pages={42-82}
}
  • M. Abdalla, J. Birkett, +5 authors N. Smart
  • Published 2010
  • Mathematics, Computer Science
  • Journal of Cryptology
  • In this paper, we introduce a new primitive called identity-based encryption with wildcards, or WIBE for short. It allows a sender to encrypt messages to a whole range of receivers whose identities match a certain pattern. This pattern is defined through a sequence of fixed strings and wildcards, where any string can take the place of a wildcard in a matching identity. Our primitive can be applied to provide an intuitive way to send encrypted email to groups of users in a corporate hierarchy… CONTINUE READING
    26 Citations

    Figures, Tables, and Topics from this paper.

    Explore Further: Topics Discussed in This Paper

    Broadcast Encryption with Traitor Tracing
    • 1
    • PDF
    Traitor Tracing against Public Collaboration
    • 8
    • PDF
    Proxy Re-Encryption Scheme Supporting a Selection of Delegatees
    • 1
    • PDF
    Serial number based encryption and its application for mobile social networks
    • 2
    Edit Distance Based Encryption and Its Application
    • 2
    • Highly Influenced

    References

    SHOWING 1-10 OF 47 REFERENCES
    Identity-Based Encryption Gone Wild
    • 103
    • PDF
    Identity-Based Cryptosystems and Signature Schemes
    • 6,185
    • PDF
    Chosen-Ciphertext Security from Identity-Based Encryption
    • 919
    • Highly Influential
    • PDF
    Hierarchical Identity Based Encryption with Constant Size Ciphertext
    • 1,247
    • Highly Influential
    • PDF
    Secure and practical identity-based encryption
    • 108
    • PDF
    Attribute-based encryption for fine-grained access control of encrypted data
    • 4,351
    • PDF
    Identity-Based Encryption from the Weil Pairing
    • 5,233
    • PDF
    Generalized Identity Based and Broadcast Encryption Schemes
    • 214
    • Highly Influential
    • PDF
    Efficient Identity-Based Encryption Without Random Oracles
    • 1,848
    • Highly Influential
    • PDF