• Identity-based encryption (IBE), is an important primitive of identity-based cryptography. As such it is a type of public-key encryption in which the public...
    16 KB (1,942 words) - 00:54, 12 April 2025
  • month) in the identity. Identity-based encryption Identity-based conditional proxy re-encryption SM9 - Chinese National Identity Based Cryptography Standard...
    7 KB (868 words) - 15:50, 7 December 2024
  • grants access. Attribute-based encryption is provably a generalisation of identity-based encryption. Identity-based encryption was first proposed in 1984...
    11 KB (1,325 words) - 16:16, 7 December 2024
  • Thumbnail for Functional encryption
    generalizes several existing primitives including Identity-based encryption (IBE) and attribute-based encryption (ABE). In the IBE case, define F ( k , x ) {\displaystyle...
    5 KB (534 words) - 15:12, 30 November 2024
  • Thumbnail for Dan Boneh
    derived from the recipients identity. Boneh, with Matt Franklin, proposed one of the first identity-based encryption schemes based on the Weil pairing. The...
    14 KB (1,150 words) - 19:02, 6 February 2025
  • Thumbnail for Clifford Cocks
    made. In 2001, Cocks developed one of the first secure identity-based encryption (IBE) schemes, based on assumptions about quadratic residues in composite...
    11 KB (1,032 words) - 15:12, 22 September 2024
  • Identity-based conditional proxy re-encryption (IBCPRE) is a type of proxy re-encryption (PRE) scheme in the identity-based public key cryptographic setting...
    15 KB (2,150 words) - 09:47, 8 March 2025
  • Certificate-based encryption is a system in which a certificate authority uses ID-based cryptography to produce a certificate. This system gives the users...
    2 KB (332 words) - 18:27, 28 November 2024
  • Sakai–Kasahara scheme (category Identity-based cryptography)
    scheme, also known as the Sakai–Kasahara key encryption algorithm (SAKKE), is an identity-based encryption (IBE) system proposed by Ryuichi Sakai and Masao...
    10 KB (1,588 words) - 06:26, 31 July 2024
  • Thumbnail for Public-key cryptography
    Off-the-Record Messaging Books on cryptography GNU Privacy Guard Identity-based encryption (IBE) Key escrow Key-agreement protocol PGP word list Post-quantum...
    40 KB (4,512 words) - 17:51, 26 March 2025
  • provide efficient identity-based encryption as well as pairing-based signatures, signcryption, key agreement, and proxy re-encryption.[citation needed]...
    39 KB (4,676 words) - 10:16, 27 April 2025
  • Boneh–Franklin scheme (category Identity-based cryptography)
    The Boneh–Franklin scheme is an identity-based encryption system proposed by Dan Boneh and Matthew K. Franklin in 2001. This article refers to the protocol...
    6 KB (1,142 words) - 11:11, 13 February 2024
  • includes techniques for identity-based encryption, signatures, signcryption, key agreement, and proxy re-encryption, all based on bilinear pairings. "IEEE...
    6 KB (629 words) - 03:54, 31 July 2024
  • Attribute-based encryption are that it attempts to solve issues that exist in current public-key infrastructure(PKI) and identity-based encryption(IBE) implementations...
    53 KB (6,671 words) - 06:52, 7 April 2025
  • other efficient implementation is known, such as identity-based encryption or attribute-based encryption schemes. Thus, the security level of some pairing...
    8 KB (1,150 words) - 00:30, 9 August 2024
  • Authenticated Encryption (AE) is an encryption scheme which simultaneously assures the data confidentiality (also known as privacy: the encrypted message...
    19 KB (2,104 words) - 21:32, 28 April 2025
  • XDH assumption (category Pairing-based cryptography)
    cryptographic protocols, including tri-partite key exchange, identity based encryption, and secret handshakes (to name a few). However, the ease of computing...
    5 KB (565 words) - 02:40, 18 June 2024
  • than the set of input plaintexts. Certain schemes, such as Cocks Identity Based Encryption, or the Goldwasser-Micali cryptosystem result in ciphertexts hundreds...
    3 KB (337 words) - 00:33, 21 October 2024
  • Pairing (category Pairing-based cryptography)
    MOV attack). It and other pairings have been used to develop identity-based encryption schemes. Scalar products on complex vector spaces are sometimes...
    6 KB (1,096 words) - 19:35, 13 March 2025
  • Cocks IBE scheme (category Identity-based cryptography)
    Cocks IBE scheme is an identity based encryption system proposed by Clifford Cocks in 2001. The security of the scheme is based on the hardness of the...
    6 KB (1,208 words) - 08:54, 19 February 2025
  • Jean-Pierre (2018). "Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme". arXiv:1804.02556 [cs.CR]. "I am afraid...
    39 KB (2,963 words) - 09:04, 19 March 2025
  • Thumbnail for Forward secrecy
    hierarchical identity-based encryption and attribute-based encryption, while Günther et al. (2017) use a different construction that can be based on any hierarchical...
    25 KB (2,954 words) - 13:18, 21 March 2025
  • Certificateless cryptography (category Identity-based cryptography)
    aimed to address the issue of key custody in the identity-based model, specifically targeting the encryption protocol developed by Boneh and Franklin (2003)...
    4 KB (606 words) - 17:20, 16 February 2025
  • cryptography, the ElGamal encryption system is an asymmetric key encryption algorithm for public-key cryptography which is based on the Diffie–Hellman key...
    10 KB (1,473 words) - 11:12, 31 March 2025
  • Thumbnail for Adam Back
    secrecy" security property for email and to observe that any identity-based encryption scheme can be used to provide non-interactive forward secrecy...
    11 KB (842 words) - 23:53, 8 December 2024
  • from the encryption schemes’ complex key management and large computational and data storage requirements. Homomorphic encryption Identity management...
    41 KB (4,559 words) - 04:43, 31 July 2024
  • Thumbnail for Proofpoint, Inc.
    Proofpoint, Inc. (category Companies based in Sunnyvale, California)
    blogs and FTP-based communications. Proofpoint also introduced policy-based email encryption features, using identity-based encryption technology licensed...
    21 KB (1,757 words) - 06:48, 29 January 2025
  • Proxy re-encryption should not be confused with proxy signatures, which is a separate construction with a different purpose. Identity-based conditional...
    6 KB (897 words) - 03:10, 24 January 2025
  • Key-agreement protocol Access control Certificate authority ID-based cryptography Identity based encryption (IBE) Key escrow PGP word list Pretty Good Privacy Pseudonymity...
    4 KB (584 words) - 20:34, 18 October 2024
  • 1515/jmc-2016-0030, S2CID 33121117 Boneh, Dan; Franklin, Matthew (2003), "Identity-based encryption from the Weil pairing", SIAM Journal on Computing, 32 (3): 586–615...
    18 KB (2,181 words) - 05:03, 17 April 2025