2009
DOI: 10.1007/978-3-642-01440-6_25
|View full text |Cite
|
Sign up to set email alerts
|

A Variant of Boneh-Gentry-Hamburg’s Pairing-Free Identity Based Encryption Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 14 publications
0
12
0
Order By: Relevance
“…Furthermore, due to time constraints we have been unable to give a performance comparison between the schemes considered here and the original scheme due to Boneh, Gentry and Hamburg; we hope to explore this also as part of future work. In addition, this paper identifies an improvement to the work of Jhanwar and Barua [15] that provides their scheme with IND-ID-CPA security. Our experimental results have shown that this scheme has comparable performance to the original Cocks scheme, and has reduced ciphertext size.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Furthermore, due to time constraints we have been unable to give a performance comparison between the schemes considered here and the original scheme due to Boneh, Gentry and Hamburg; we hope to explore this also as part of future work. In addition, this paper identifies an improvement to the work of Jhanwar and Barua [15] that provides their scheme with IND-ID-CPA security. Our experimental results have shown that this scheme has comparable performance to the original Cocks scheme, and has reduced ciphertext size.…”
Section: Discussionmentioning
confidence: 99%
“…Another contribution of this paper is a security assessment of a scheme by Jhanwar and Barua [15], which in turn is a variant of the non-anonymous IBE system from [11]. We consider an alternative parameter setting that gives us IND-ID-CPA security.…”
Section: Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Our method is similar to the one given inŢiplea et al 14 to attack an IBE encryption scheme proposed in Jhanwar and Barua. 15 The rest of this paper is organized as follows. In Section 2, we recall the definition and notion for IBAKE protocols.…”
Section: Our Contributionmentioning
confidence: 99%
“…Jhanwar and Barua [11] made some significant observations on the BGH systems (for solving equations in the form Rx 2 +Sy 2 ≡ 1 (mod N )) and proposed a trade-off system that reduces the private key length but increases the ciphertext length. They found that by knowing the value of S (mod N ), one can find a random solution to the equation Rx 2 + Sy 2 ≡ 1 (mod N ) using only one inversion in Z N .…”
Section: Introductionmentioning
confidence: 99%