This paper presents a systematic study of what it takes to prevent a malicious KGC from decrypting a ciphertext encrypted for an honest user, which covers the ...
Towards Anonymous Ciphertext Indistinguishability with Identity ...
link.springer.com › content › pdf
The only privacy leakage allowed in Chow's model is via querying an embedded-identity encryption oracle. In this paper, we strengthen his model to allow ...
This paper presents a systematic study of what it takes to prevent a malicious KGC from decrypting a ciphertext encrypted for an honest user, which covers the ...
This paper presents a systematic study of what it takes to prevent a malicious KGC from decrypting a ciphertext encrypted for an honest user, which covers the ...
The only privacy leakage allowed in Chow's model is via querying an embedded-identity encryption oracle. In this paper, we strengthen his model to allow ...
Sep 12, 2018 · Abstract, Key escrow is a major drawback of identity-based encryption (IBE). The key generation centre (KGC) can generate the user secret ...
Towards anonymous ciphertext indistinguishability with identity leakage. TH Yuen, C Zhang, SSM Chow, JK Liu. International Conference on Provable Security, 139- ...
As security, we require that valid and invalid ciphertexts are computationally indistinguishable even if an adversary can obtain one secret key per identity for ...
Anonymous hierarchical identity-based encryption with ...
www.sciencedirect.com › article › abs › pii
Similar to traditional PKE, the basic security of (H)IBE is indistinguishability, which ensures that a ciphertext for a recipient's identity does not leak any ...
Feb 24, 2020 · However, in order to further improve the practicability of identity-based encryption (IBE) system, an IBE scheme must have the chosen-ciphertext ...