ID-based encryption

Known as: IBE, Identity based encryption, Identity-Based Encryption 
ID-based encryption, or identity-based encryption (IBE), is an important primitive of ID-based cryptography. As such it is a type of public-key… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based… (More)
  • table 1
  • table 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Identity-Based Encryption (IBE) o ers an interesting alternative to PKI-enabled encryption as it eliminates the need for digital… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Public Key… (More)
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme… (More)
Is this relevant?
2007
2007
This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption… (More)
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We present an Identity Based Encryption (IBE) system that is fully secure in the standard model and has several advantages over… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A forward-secure encryption scheme protects secret keys from exposure by evolving the keys with time. Forward security has… (More)
  • table 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We introduce the concept of hierarchical identity-based encryption (HIBE) schemes, give precise definitions of their security and… (More)
Is this relevant?