{"title":"Certificateless Encryption","authors":"Sherman S. M. Chow","doi":"10.3233/978-1-58603-947-9-135","DOIUrl":"https://doi.org/10.3233/978-1-58603-947-9-135","url":null,"abstract":"","PeriodicalId":202657,"journal":{"name":"Identity-Based Cryptography","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133584473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Implementation of Pairings","authors":"D. Hankerson, A. Menezes, M. Scott","doi":"10.3233/978-1-58603-947-9-188","DOIUrl":"https://doi.org/10.3233/978-1-58603-947-9-188","url":null,"abstract":"This chapter describes and compares the software implementation of popular elliptic curve pairings on two architectures, of which the Intel Pentium 4 and Core2 are representatives.","PeriodicalId":202657,"journal":{"name":"Identity-Based Cryptography","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131127397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generalized IBE in the Exponent-Inversion Framework","authors":"Xavier Boyen","doi":"10.3233/978-1-58603-947-9-83","DOIUrl":"https://doi.org/10.3233/978-1-58603-947-9-83","url":null,"abstract":"The purpose of this chapter is to provide an abstraction for the class of Exponent-Inversion IBE exemplified by the [Bscr ][Bscr ]2 and [Sscr ][Kscr ] schemes, and, on the basis of that abstraction, to show that those schemes do support interesting and useful extensions such as HIBE and ABE. \u0000 \u0000Our results narrow, if not entirely close, the “flexibility gap” between the Exponent-Inversion and Commutative-Blinding IBE concepts.","PeriodicalId":202657,"journal":{"name":"Identity-Based Cryptography","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129061875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity-Based Identification and Signature Schemes using Error Correcting Codes","authors":"Pierre-Louis Cayrel, P. Gaborit, M. Girault","doi":"10.3233/978-1-58603-947-9-119","DOIUrl":"https://doi.org/10.3233/978-1-58603-947-9-119","url":null,"abstract":"Abstract. In this paper, we propose a new identity-based authentica-tion (and signature) scheme based on error-correcting codes. This schemeis up to date the first identity-based scheme not based on number theory.The scheme combines two well known code-based schemes: the signaturescheme of Courtois, Finiasz and Sendrier and the zero-knowledge au-thentication scheme of Stern (which may also be used for signature).The scheme inherits from the characteristics of the previous schemes: ithas a large public key of order 1Mo and necessitates a certain number ofexchange rounds. The scheme can also work in signature but leads to avery large signature of size 1Mo.Keywords : Signature, Authentication, Identity based scheme, Correct-ing codes, Stern, Niederreiter. 1 Introduction Themostcriticalpointofclassicalpublickeycryptography(RSA,ElGamal...)is in the management of the authenticity of the public key. In fact, if Alice man-ages to take Bob’s identity by cheating her own public key as Bob’s one, shewould be able to decipher all messages sent to Bob and to sign any messageusing the stolen identity.In 1984, Shamir introduced the concept of IDentity-based Public Key Cryp-tography ID-PKC [15] in order to simplify the management and the authenti-cation of the public key, which time passing by, had become more and morecomplex.In the ID-PKC scheme of Shamir, the public key of an user is undeniablylinked to his identity on the network (user-id): it can be a concatenation ofany publicly known information: his name, his e-mail, his phone number, etc ...","PeriodicalId":202657,"journal":{"name":"Identity-Based Cryptography","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115207559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}