Security proof of Sakai-Kasahara's identity-based encryption scheme.
Cheng, Zhaohui and Chen, Liqun (2005) Security proof of Sakai-Kasahara's identity-based encryption scheme. In: 10th IMA International Conference on Cryptography and Coding, Cirencester, UK. Proceedings. Springer Verlag, Heidelberg, pp. 442-459. ISBN 3-540-30276-X
Full text is not in this repository.
In 2003 Sakai and Kasahara proposed an identity-based encryption scheme, which has several performance advantages over existing methods. However, the scheme does not meet the standard security requirement. This work presented an efficient IBE scheme that employs a simple version of the Sakai-Kasahara scheme and the Fujisaki-Okamoto transformation. The chosen-ciphertext security of the scheme was rigorously proved in the random oracle model based on a reasonable hardness assumption. The work offers implementers an alternative to those patented protected schemes with an efficient and security proved scheme and has been used to construct other primitive such as identity-based signcryption, CL-PKEs, etc.
|Item Type:||Book Section|
|Research Areas:||A. > School of Science and Technology > Computer and Communications Engineering|
|Depositing User:||Repository team|
|Date Deposited:||21 Oct 2008 13:45|
|Last Modified:||13 Oct 2016 14:11|
Actions (login required)