×
This paper presents a systematic study of what it takes to prevent a malicious KGC from decrypting a ciphertext encrypted for an honest user, which covers the ...
The only privacy leakage allowed in Chow's model is via querying an embedded-identity encryption oracle. In this paper, we strengthen his model to allow ...
This paper presents a systematic study of what it takes to prevent a malicious KGC from decrypting a ciphertext encrypted for an honest user, which covers the ...
This paper presents a systematic study of what it takes to prevent a malicious KGC from decrypting a ciphertext encrypted for an honest user, which covers the ...
The only privacy leakage allowed in Chow's model is via querying an embedded-identity encryption oracle. In this paper, we strengthen his model to allow ...
Sep 12, 2018 · Abstract, Key escrow is a major drawback of identity-based encryption (IBE). The key generation centre (KGC) can generate the user secret ...
Towards anonymous ciphertext indistinguishability with identity leakage. TH Yuen, C Zhang, SSM Chow, JK Liu. International Conference on Provable Security, 139- ...
As security, we require that valid and invalid ciphertexts are computationally indistinguishable even if an adversary can obtain one secret key per identity for ...
Similar to traditional PKE, the basic security of (H)IBE is indistinguishability, which ensures that a ciphertext for a recipient's identity does not leak any ...
Feb 24, 2020 · However, in order to further improve the practicability of identity-based encryption (IBE) system, an IBE scheme must have the chosen-ciphertext ...