• Identity-based encryption (IBE), is an important primitive of identity-based cryptography. As such it is a type of public-key encryption in which the public...
    16 KB (1,944 words) - 12:51, 17 February 2024
  • grants access. Attribute-based encryption is provably a generalisation of identity-based encryption. Identity-based encryption was first proposed in 1984...
    11 KB (1,325 words) - 03:09, 31 July 2024
  • month) in the identity. Identity-based encryption Identity-based conditional proxy re-encryption SM9 - Chinese National Identity Based Cryptography Standard...
    7 KB (828 words) - 07:22, 6 August 2024
  • Thumbnail for Clifford Cocks
    made. In 2001, Cocks developed one of the first secure identity-based encryption (IBE) schemes, based on assumptions about quadratic residues in composite...
    11 KB (1,032 words) - 15:12, 22 September 2024
  • Thumbnail for Dan Boneh
    derived from the recipients identity. Boneh, with Matt Franklin, proposed one of the first identity-based encryption schemes based on the Weil pairing. The...
    14 KB (1,150 words) - 07:33, 13 September 2024
  • Certificate-based encryption is a system in which a certificate authority uses ID-based cryptography to produce a certificate. This system gives the users...
    2 KB (332 words) - 12:15, 21 November 2022
  • Identity-based conditional proxy re-encryption (IBCPRE) is a type of proxy re-encryption (PRE) scheme in the identity-based public key cryptographic setting...
    15 KB (2,150 words) - 15:16, 14 December 2023
  • Boneh–Franklin scheme (category Identity-based cryptography)
    The Boneh–Franklin scheme is an identity-based encryption system proposed by Dan Boneh and Matthew K. Franklin in 2001. This article refers to the protocol...
    6 KB (1,142 words) - 11:11, 13 February 2024
  • Thumbnail for Public-key cryptography
    Off-the-Record Messaging Books on cryptography GNU Privacy Guard Identity-based encryption (IBE) Key escrow Key-agreement protocol PGP word list Post-quantum...
    36 KB (4,186 words) - 09:40, 5 October 2024
  • provide efficient identity-based encryption as well as pairing-based signatures, signcryption, key agreement, and proxy re-encryption.[citation needed]...
    39 KB (4,674 words) - 13:00, 24 September 2024