Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,648,000 papers from all fields of science
Search
Sign In
Create Free Account
ID-based encryption
Known as:
IBE
, Identity based encryption
, Identity-Based Encryption
ID-based encryption, or identity-based encryption (IBE), is an important primitive of ID-based cryptography. As such it is a type of public-key…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
24 relations
Attribute-based encryption
Authentication
Certificate-based encryption
Certificateless cryptography
Expand
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Secure Communication Scheme of VANET with Privacy Preserving
Ren-Junn Hwang
,
Yu-Kai Hsiao
,
Yen-Fu Liu
IEEE 17th International Conference on Parallel…
2011
Corpus ID: 17820388
This paper proposes a secure communication and privacy preserving scheme of Vehicular ad-hoc network (VANET). VANET improves road…
Expand
2011
2011
Identity-Based Cryptography for Cloud Security
Hongwei Li
,
Yuan-Shun Dai
,
Bo Yang
IACR Cryptology ePrint Archive
2011
Corpus ID: 18599257
Abstract—Cloud computing is a style of computing in which dynamically scalable and commonly virtualized resources are provided as…
Expand
2010
2010
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
D. Fiore
,
R. Gennaro
,
N. Smart
Pairing-Based Cryptography
2010
Corpus ID: 14623343
We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation…
Expand
Highly Cited
2010
Highly Cited
2010
Private key agreement and secure communication for heterogeneous sensor networks
S. Rahman
,
K. El-Khatib
J. Parallel Distributed Comput.
2010
Corpus ID: 35774587
2008
2008
Identity-Based Fully Distributed Certificate Authority in an OLSR MANET
Pengrui Xia
,
Meng Wu
,
Kun Wang
,
X. Chen
International Conference on Wireless…
2008
Corpus ID: 18680128
As the absence of a centralized control in mobile ad hoc networks (MANET), the tradition public key infrastructure (PKI) model is…
Expand
2007
2007
Software Implementation of Arithmetic in F3m
O. Ahmadi
,
D. Hankerson
,
A. Menezes
International Workshop on Arithmetic of Finite…
2007
Corpus ID: 15446736
Fast arithmetic for characteristic three finite fields is desirable in pairing-based cryptography because there is a suitable…
Expand
Highly Cited
2006
Highly Cited
2006
Implementing Cryptographic Pairings on Smartcards
M. Scott
,
Neil Costigan
,
W. Abdulwahab
Workshop on Cryptographic Hardware and Embedded…
2006
Corpus ID: 8838664
Pairings on elliptic curves are fast coming of age as cryptographic primitives for deployment in new security applications…
Expand
2006
2006
Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts
Eike Kiltz
IACR Cryptology ePrint Archive
2006
Corpus ID: 14294683
We describe a practical identity-based encryption scheme that is secure in the standard model againstchosen-ciphertext(IND-CCA2…
Expand
2005
2005
ID-based ring authenticated encryption
Tianjie Cao
,
D. Lin
,
Rui Xue
19th International Conference on Advanced…
2005
Corpus ID: 17058732
Ring authenticated encryption has the following security requirements: semantic-security, recipient-designation, verification…
Expand
2004
2004
An Identity Based Encryption system
L. Owens
,
A. Duffy
,
T. Dowling
Principles and Practice of Programming in Java
2004
Corpus ID: 8779959
We describe an Identity Based Encryption (IBE) cryptosystem based on a scheme presented by Boneh and Franklin [3]. We implement…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE