2009
DOI: 10.17487/rfc5408
|View full text |Cite
|
Sign up to set email alerts
|

Identity-Based Encryption Architecture and Supporting Data Structures

Abstract: Identity-Based Encryption Architecture and Supporting Data Structures Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(16 citation statements)
references
References 14 publications
0
16
0
Order By: Relevance
“…However, the PKG cannot learn the public key xyP given xP and yP, based on the hardness of the Elliptic Curve Diffie-Hellman problem. This property of resistance to passive key escrow from the PKG is not applicable to the basic IBE protocols proposed in [RFC5091]), [RFC5408], and [RFC5409].…”
Section: Ibake Protocolmentioning
confidence: 96%
See 4 more Smart Citations
“…However, the PKG cannot learn the public key xyP given xP and yP, based on the hardness of the Elliptic Curve Diffie-Hellman problem. This property of resistance to passive key escrow from the PKG is not applicable to the basic IBE protocols proposed in [RFC5091]), [RFC5408], and [RFC5409].…”
Section: Ibake Protocolmentioning
confidence: 96%
“…The public key can then be used by an Initiator to encrypt messages that the recipient can decrypt using the corresponding private key. The IBE framework is defined in [RFC5091], [RFC5408] …”
Section: Ibe: Definitionmentioning
confidence: 99%
See 3 more Smart Citations