Security proof of Sakai-Kasahara's identity-based encryption scheme.
Cheng, Zhaohui and Chen, Liqun (2005) Security proof of Sakai-Kasahara's identity-based encryption scheme. In: 10th IMA International Conference on Cryptography and Coding, Cirencester, UK. Proceedings. Springer Verlag, Heidelberg, pp. 442-459. ISBN 3-540-30276-X
Full text is not in this repository.
Official URL: http://www.springerlink.com/content/l0755w35l45725...
In 2003 Sakai and Kasahara proposed an identity-based encryption scheme, which has several performance advantages over existing methods. However, the scheme does not meet the standard security requirement. This work presented an efficient IBE scheme that employs a simple version of the Sakai-Kasahara scheme and the Fujisaki-Okamoto transformation. The chosen-ciphertext security of the scheme was rigorously proved in the random oracle model based on a reasonable hardness assumption. The work offers implementers an alternative to those patented protected schemes with an efficient and security proved scheme and has been used to construct other primitive such as identity-based signcryption, CL-PKEs, etc.
|Item Type:||Book Section|
|Research Areas:||A. > School of Science and Technology > Computer and Communications Engineering|
|Deposited On:||21 Oct 2008 13:45|
|Last Modified:||13 May 2014 15:37|
Repository staff only: item control page
Full text downloads (NB count will be zero if no full text documents are attached to the record)
Downloads per month over the past year