An efficient and full secure identity-based encryption scheme

  • Rong Ma
  • , Zhen Fu Cao*
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

This paper presented an efficient and secure identity-based encryption scheme. Compared to the previous scheme, it has the advantage of security or efficiency. This new scheme can achieve adaptive CCA2-security under BDH assumption with tight reduction. The construction was made by use of the ″Twin Diffie-Hellman″ technique proposed by Cash et al, only requiring one pairing computation during the encryption procedure.

Original languageEnglish
Pages (from-to)389-392
Number of pages4
JournalShanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University
Volume44
Issue number3
StatePublished - Mar 2010
Externally publishedYes

Keywords

  • Chosen cipher text security
  • Identity-based encryption
  • Random oracle model
  • Tight reduction

Fingerprint

Dive into the research topics of 'An efficient and full secure identity-based encryption scheme'. Together they form a unique fingerprint.

Cite this