2024
DOI: 10.62056/ahsdkmp-3y
|View full text |Cite
|
Sign up to set email alerts
|

Exponent-Inversion P-Signatures and Accountable Identity-Based Encryption from SXDH

Tsz Yuen,
Sherman Chow,
Huangting Wu
et al.

Abstract: Salient in many cryptosystems, the exponent-inversion technique began without randomization in the random oracle model (SCIS '03, PKC '04), evolved into the Boneh-Boyen short signature scheme (JoC '08) and exerted a wide influence. Seen as a notable case, Gentry's (EuroCrypt '06) identity-based encryption (IBE) applies exponent inversion on a randomized base in its identity-based trapdoors. Making use of the non-static q-strong Diffie-Hellman assumption, Boneh-Boyen signatures are shown to be unforgeable again… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 57 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?