2007
DOI: 10.1109/focs.2007.4389533
|View full text |Cite
|
Sign up to set email alerts
|

Space-Efficient Identity Based EncryptionWithout Pairings

Abstract: Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) on elliptic curves. One exception is an elegant system due to Cocks which builds an IBE based on the quadratic residuosity problem modulo an RSA composite N . The Cocks system, however, produces long ciphertexts. Since the introduction of the Cocks system in 2001 it has been an open problem to construct a space efficient IBE system without pairings. In this paper we present an IBE system in which ciphertext size… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
76
0
3

Year Published

2010
2010
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 77 publications
(79 citation statements)
references
References 57 publications
0
76
0
3
Order By: Relevance
“…Anonymity is a useful property in many applications, such as fully private communication [7] and searching on encrypted data [1,11]. While there are a few anonymous (non-hierarchical) IBEs [10,13,19,24], only one other HIBE is known to be anonymous [15].…”
Section: Our Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Anonymity is a useful property in many applications, such as fully private communication [7] and searching on encrypted data [1,11]. While there are a few anonymous (non-hierarchical) IBEs [10,13,19,24], only one other HIBE is known to be anonymous [15].…”
Section: Our Resultsmentioning
confidence: 99%
“…However, there are no trapdoor functions per se in pairing-based constructions; instead, the pairing is used to facilitate key agreement between the encrypter and decrypter. Our approach, therefore, may be seen as a blending of pairing-based techniques and the trapdoor techniques found in [13,18,24].…”
Section: Related Techniques and Workmentioning
confidence: 99%
See 1 more Smart Citation
“…12 In the case of IKIG, the figure of 1.9 kilobits refers to the encrypted pre-master secret and the signed message in our key agreement protocol. 13 This clearly shows that an execution of the TLS protocol in the GSI is significantly more costly than our protocol in IKIG in terms of bandwidth requirements.…”
Section: Communication Costsmentioning
confidence: 89%
“…For example, the sizes of a nonce and cipher_suite in the ClientHello message are merely 28 and 2 bytes, respectively [19]. 13 Similarly, we assume ServerIdentifier and ClientIdentifier are small fields which can be ignored in our calculation. public keys are predictable and are easy to construct by entities within the VO, provided that they have the correct system parameters.…”
Section: Qualitative Benefitsmentioning
confidence: 99%