Identity-based encryption (IBE), is an important primitive of identity-based cryptography. As such it is a type of public-key encryption in which the public...
16 KB (1,950 words) - 23:58, 1 August 2025
month) in the identity. Identity-based encryption Identity-based conditional proxy re-encryption SM9 - Chinese National Identity Based Cryptography Standard...
8 KB (868 words) - 04:06, 26 July 2025
grants access. Attribute-based encryption is provably a generalisation of identity-based encryption. Identity-based encryption was first proposed in 1984...
11 KB (1,325 words) - 14:43, 5 July 2025
Dan Boneh (section Identity-Based Encryption)
derived from the recipients identity. Boneh, with Matt Franklin, proposed one of the first identity-based encryption schemes based on the Weil pairing. The...
14 KB (1,158 words) - 03:11, 29 July 2025
Clifford Cocks (section Identity-based encryption)
made. In 2001, Cocks developed one of the first secure identity-based encryption (IBE) schemes, based on assumptions about quadratic residues in composite...
11 KB (1,032 words) - 15:12, 22 September 2024
Sakai–Kasahara scheme (category Identity-based cryptography)
scheme, also known as the Sakai–Kasahara key encryption algorithm (SAKKE), is an identity-based encryption (IBE) system proposed by Ryuichi Sakai and Masao...
10 KB (1,588 words) - 05:29, 14 June 2025
Identity-based conditional proxy re-encryption (IBCPRE) is a type of proxy re-encryption (PRE) scheme in the identity-based public key cryptographic setting...
15 KB (2,150 words) - 09:47, 8 March 2025
Certificate-based encryption is a system in which a certificate authority uses ID-based cryptography to produce a certificate. This system gives the users...
2 KB (332 words) - 14:02, 20 July 2025
generalizes several existing primitives including Identity-based encryption (IBE) and attribute-based encryption (ABE). In the IBE case, define F ( k , x ) {\displaystyle...
5 KB (534 words) - 15:12, 30 November 2024
Public-key cryptography (redirect from Asymmetric key encryption algorithm)
Off-the-Record Messaging Books on cryptography GNU Privacy Guard Identity-based encryption (IBE) Key escrow Key-agreement protocol PGP word list Post-quantum...
40 KB (4,551 words) - 23:23, 28 July 2025
IEEE P1363 (redirect from Integer Factorization Encryption Scheme)
includes techniques for identity-based encryption, signatures, signcryption, key agreement, and proxy re-encryption, all based on bilinear pairings. "IEEE...
6 KB (629 words) - 03:54, 31 July 2024
Elliptic-curve cryptography (redirect from Parabolic encryption)
provide efficient identity-based encryption as well as pairing-based signatures, signcryption, key agreement, and proxy re-encryption.[citation needed]...
39 KB (4,677 words) - 07:29, 27 June 2025
Boneh–Franklin scheme (category Identity-based cryptography)
The Boneh–Franklin scheme is an identity-based encryption system proposed by Dan Boneh and Matthew K. Franklin in 2001. This article refers to the protocol...
6 KB (1,142 words) - 11:11, 13 February 2024
Attribute-based encryption are that it attempts to solve issues that exist in current public-key infrastructure(PKI) and identity-based encryption(IBE) implementations...
53 KB (6,639 words) - 09:32, 4 August 2025
In cryptography, the ElGamal encryption system is a public-key encryption algorithm based on the Diffie–Hellman key exchange. It was described by Taher...
10 KB (1,467 words) - 01:36, 20 July 2025
Pairing (category Pairing-based cryptography)
MOV attack). It and other pairings have been used to develop identity-based encryption schemes. Scalar products on complex vector spaces are sometimes...
6 KB (1,096 words) - 19:35, 13 March 2025
XDH assumption (category Pairing-based cryptography)
cryptographic protocols, including tri-partite key exchange, identity based encryption, and secret handshakes (to name a few). However, the ease of computing...
5 KB (565 words) - 02:40, 18 June 2024
Jean-Pierre (2018). "Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme". arXiv:1804.02556 [cs.CR]. "I am afraid...
41 KB (2,957 words) - 17:52, 4 August 2025
Authenticated encryption (AE) is any encryption scheme which simultaneously assures the data confidentiality (also known as privacy: the encrypted message...
19 KB (2,087 words) - 13:23, 24 July 2025
secrecy" security property for email and to observe that any identity-based encryption scheme can be used to provide non-interactive forward secrecy...
11 KB (842 words) - 23:53, 8 December 2024
Certificateless cryptography (category Identity-based cryptography)
aimed to address the issue of key custody in the identity-based model, specifically targeting the encryption protocol developed by Boneh and Franklin (2003)...
4 KB (606 words) - 17:20, 16 February 2025
Ciphertext expansion (section Probabilistic Encryption)
than the set of input plaintexts. Certain schemes, such as Cocks Identity Based Encryption, or the Goldwasser-Micali cryptosystem result in ciphertexts hundreds...
3 KB (337 words) - 00:33, 21 October 2024
1515/jmc-2016-0030, S2CID 33121117 Boneh, Dan; Franklin, Matthew (2003), "Identity-based encryption from the Weil pairing", SIAM Journal on Computing, 32 (3): 586–615...
18 KB (2,181 words) - 05:03, 17 April 2025
Cocks IBE scheme (category Identity-based cryptography)
Cocks IBE scheme is an identity based encryption system proposed by Clifford Cocks in 2001. The security of the scheme is based on the hardness of the...
6 KB (1,208 words) - 08:54, 19 February 2025
other efficient implementation is known, such as identity-based encryption or attribute-based encryption schemes. Thus, the security level of some pairing...
8 KB (1,150 words) - 19:31, 30 June 2025
Key-agreement protocol Access control Certificate authority ID-based cryptography Identity based encryption (IBE) Key escrow PGP word list Pretty Good Privacy Pseudonymity...
4 KB (584 words) - 20:34, 18 October 2024
RSA cryptosystem (redirect from RSA encryption)
is used in digital signature such as RSASSA-PSS or RSA-FDH, public-key encryption of very short messages (almost always a single-use symmetric key in a...
68 KB (8,447 words) - 02:37, 31 July 2025
PALISADE (software) (category Homomorphic encryption)
PALISADE Attribute-Based Encryption Extensions (includes identity-based encryption and ciphertext-policy attribute-based encryption) PALISADE WebAssembly...
11 KB (946 words) - 09:52, 16 February 2025
entity. (GM/T 0044.3) The Identity-Based Key Establishment and Key Wrapping (GM/T 0044.4) The Identity Based Public-Key Encryption Key Encapsulation Algorithm...
8 KB (948 words) - 05:00, 31 July 2024
Journal of the ACM 58 (2011) Chosen-Ciphertext Security from Identity-Based Encryption. Dan Boneh, Ran Canetti, Shai Halevi, and Jonathan Katz. SIAM...
9 KB (925 words) - 20:37, 15 January 2025