Security proof of Sakai-Kasahara's identity-based encryption scheme.

Cheng, Zhaohui and Chen, Liqun (2005) Security proof of Sakai-Kasahara's identity-based encryption scheme. In: 10th IMA International Conference on Cryptography and Coding, Cirencester, UK. Proceedings. Springer Verlag, Heidelberg, pp. 442-459. ISBN 3-540-30276-X. [Book Section] (doi:10.1007/11586821_29)


In 2003 Sakai and Kasahara proposed an identity-based encryption scheme, which has several performance advantages over existing methods. However, the scheme does not meet the standard security requirement. This work presented an efficient IBE scheme that employs a simple version of the Sakai-Kasahara scheme and the Fujisaki-Okamoto transformation. The chosen-ciphertext security of the scheme was rigorously proved in the random oracle model based on a reasonable hardness assumption. The work offers implementers an alternative to those patented protected schemes with an efficient and security proved scheme and has been used to construct other primitive such as identity-based signcryption, CL-PKEs, etc.

Item Type: Book Section
Research Areas: A. > School of Science and Technology > Computer and Communications Engineering
Item ID: 102
Depositing User: Repository team
Date Deposited: 21 Oct 2008 13:45
Last Modified: 13 Oct 2016 14:11

Actions (login required)

View Item View Item


Activity Overview

Additional statistics are available via IRStats2.