Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security 2010
DOI: 10.1145/1755688.1755699
|View full text |Cite
|
Sign up to set email alerts
|

Identity-based encryption based on DHIES

Abstract: Most traditional public key cryptosystems are constructed upon algebraically rich structures, which makes their key pairs combinable, i.e., the combination of some private keys and their corresponding public keys could form a new key pair. Exploring such combinable property, this paper proposes a novel Identity-Based Encryption (IBE) scheme based on the Diffie-Hellman Integrated Encryption Scheme (DHIES) with quadratic key combination structure from bilinear maps. The new scheme has a number of advantages over… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
40
0

Year Published

2011
2011
2013
2013

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(41 citation statements)
references
References 20 publications
1
40
0
Order By: Relevance
“…A recent proposal, due to Chen et al [5], has very efficient encryption and decryption and claims to have security based on the security of the DHIES public key encryption scheme. In this paper, we present collusion attacks against the scheme of [5] which recover the Trusted Authority's master secret key.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…A recent proposal, due to Chen et al [5], has very efficient encryption and decryption and claims to have security based on the security of the DHIES public key encryption scheme. In this paper, we present collusion attacks against the scheme of [5] which recover the Trusted Authority's master secret key.…”
Section: Introductionmentioning
confidence: 99%
“…A recent proposal, due to Chen et al [5], has very efficient encryption and decryption and claims to have security based on the security of the DHIES public key encryption scheme. In this paper, we present collusion attacks against the scheme of [5] which recover the Trusted Authority's master secret key. These attacks apply even in the weak IBE security model used in [5] and thus completely invalidate the security claims made in [5,Theorem 3.1], the main security result in that paper.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations