• Identity-based encryption (IBE), is an important primitive of identity-based cryptography. As such it is a type of public-key encryption in which the public...
    16 KB (1,950 words) - 23:58, 1 August 2025
  • month) in the identity. Identity-based encryption Identity-based conditional proxy re-encryption SM9 - Chinese National Identity Based Cryptography Standard...
    8 KB (868 words) - 04:06, 26 July 2025
  • grants access. Attribute-based encryption is provably a generalisation of identity-based encryption. Identity-based encryption was first proposed in 1984...
    11 KB (1,325 words) - 14:43, 5 July 2025
  • Thumbnail for Dan Boneh
    derived from the recipients identity. Boneh, with Matt Franklin, proposed one of the first identity-based encryption schemes based on the Weil pairing. The...
    14 KB (1,158 words) - 03:11, 29 July 2025
  • Thumbnail for Clifford Cocks
    made. In 2001, Cocks developed one of the first secure identity-based encryption (IBE) schemes, based on assumptions about quadratic residues in composite...
    11 KB (1,032 words) - 15:12, 22 September 2024
  • Sakai–Kasahara scheme (category Identity-based cryptography)
    scheme, also known as the Sakai–Kasahara key encryption algorithm (SAKKE), is an identity-based encryption (IBE) system proposed by Ryuichi Sakai and Masao...
    10 KB (1,588 words) - 05:29, 14 June 2025
  • Identity-based conditional proxy re-encryption (IBCPRE) is a type of proxy re-encryption (PRE) scheme in the identity-based public key cryptographic setting...
    15 KB (2,150 words) - 09:47, 8 March 2025
  • Certificate-based encryption is a system in which a certificate authority uses ID-based cryptography to produce a certificate. This system gives the users...
    2 KB (332 words) - 14:02, 20 July 2025
  • Thumbnail for Functional encryption
    generalizes several existing primitives including Identity-based encryption (IBE) and attribute-based encryption (ABE). In the IBE case, define F ( k , x ) {\displaystyle...
    5 KB (534 words) - 15:12, 30 November 2024
  • Thumbnail for Public-key cryptography
    Off-the-Record Messaging Books on cryptography GNU Privacy Guard Identity-based encryption (IBE) Key escrow Key-agreement protocol PGP word list Post-quantum...
    40 KB (4,551 words) - 23:23, 28 July 2025
  • includes techniques for identity-based encryption, signatures, signcryption, key agreement, and proxy re-encryption, all based on bilinear pairings. "IEEE...
    6 KB (629 words) - 03:54, 31 July 2024
  • provide efficient identity-based encryption as well as pairing-based signatures, signcryption, key agreement, and proxy re-encryption.[citation needed]...
    39 KB (4,677 words) - 07:29, 27 June 2025
  • Boneh–Franklin scheme (category Identity-based cryptography)
    The Boneh–Franklin scheme is an identity-based encryption system proposed by Dan Boneh and Matthew K. Franklin in 2001. This article refers to the protocol...
    6 KB (1,142 words) - 11:11, 13 February 2024
  • Attribute-based encryption are that it attempts to solve issues that exist in current public-key infrastructure(PKI) and identity-based encryption(IBE) implementations...
    53 KB (6,639 words) - 09:32, 4 August 2025
  • In cryptography, the ElGamal encryption system is a public-key encryption algorithm based on the Diffie–Hellman key exchange. It was described by Taher...
    10 KB (1,467 words) - 01:36, 20 July 2025
  • Pairing (category Pairing-based cryptography)
    MOV attack). It and other pairings have been used to develop identity-based encryption schemes. Scalar products on complex vector spaces are sometimes...
    6 KB (1,096 words) - 19:35, 13 March 2025
  • XDH assumption (category Pairing-based cryptography)
    cryptographic protocols, including tri-partite key exchange, identity based encryption, and secret handshakes (to name a few). However, the ease of computing...
    5 KB (565 words) - 02:40, 18 June 2024
  • Jean-Pierre (2018). "Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme". arXiv:1804.02556 [cs.CR]. "I am afraid...
    41 KB (2,957 words) - 17:52, 4 August 2025
  • Authenticated encryption (AE) is any encryption scheme which simultaneously assures the data confidentiality (also known as privacy: the encrypted message...
    19 KB (2,087 words) - 13:23, 24 July 2025
  • Thumbnail for Adam Back
    secrecy" security property for email and to observe that any identity-based encryption scheme can be used to provide non-interactive forward secrecy...
    11 KB (842 words) - 23:53, 8 December 2024
  • Certificateless cryptography (category Identity-based cryptography)
    aimed to address the issue of key custody in the identity-based model, specifically targeting the encryption protocol developed by Boneh and Franklin (2003)...
    4 KB (606 words) - 17:20, 16 February 2025
  • than the set of input plaintexts. Certain schemes, such as Cocks Identity Based Encryption, or the Goldwasser-Micali cryptosystem result in ciphertexts hundreds...
    3 KB (337 words) - 00:33, 21 October 2024
  • 1515/jmc-2016-0030, S2CID 33121117 Boneh, Dan; Franklin, Matthew (2003), "Identity-based encryption from the Weil pairing", SIAM Journal on Computing, 32 (3): 586–615...
    18 KB (2,181 words) - 05:03, 17 April 2025
  • Cocks IBE scheme (category Identity-based cryptography)
    Cocks IBE scheme is an identity based encryption system proposed by Clifford Cocks in 2001. The security of the scheme is based on the hardness of the...
    6 KB (1,208 words) - 08:54, 19 February 2025
  • other efficient implementation is known, such as identity-based encryption or attribute-based encryption schemes. Thus, the security level of some pairing...
    8 KB (1,150 words) - 19:31, 30 June 2025
  • Key-agreement protocol Access control Certificate authority ID-based cryptography Identity based encryption (IBE) Key escrow PGP word list Pretty Good Privacy Pseudonymity...
    4 KB (584 words) - 20:34, 18 October 2024
  • is used in digital signature such as RSASSA-PSS or RSA-FDH, public-key encryption of very short messages (almost always a single-use symmetric key in a...
    68 KB (8,447 words) - 02:37, 31 July 2025
  • Thumbnail for PALISADE (software)
    PALISADE (software) (category Homomorphic encryption)
    PALISADE Attribute-Based Encryption Extensions (includes identity-based encryption and ciphertext-policy attribute-based encryption) PALISADE WebAssembly...
    11 KB (946 words) - 09:52, 16 February 2025
  • entity. (GM/T 0044.3) The Identity-Based Key Establishment and Key Wrapping (GM/T 0044.4) The Identity Based Public-Key Encryption Key Encapsulation Algorithm...
    8 KB (948 words) - 05:00, 31 July 2024
  • Journal of the ACM 58 (2011) Chosen-Ciphertext Security from Identity-Based Encryption. Dan Boneh, Ran Canetti, Shai Halevi, and Jonathan Katz. SIAM...
    9 KB (925 words) - 20:37, 15 January 2025