• Identity-based encryption (IBE), is an important primitive of identity-based cryptography. As such it is a type of public-key encryption in which the public...
    16 KB (1,944 words) - 12:51, 17 February 2024
  • grants access. Attribute-based encryption is provably a generalisation of identity-based encryption. Identity-based encryption was first proposed in 1984...
    11 KB (1,325 words) - 03:09, 31 July 2024
  • month) in the identity. Identity-based encryption Identity-based conditional proxy re-encryption SM9 - Chinese National Identity Based Cryptography Standard...
    7 KB (828 words) - 07:22, 6 August 2024
  • Thumbnail for Clifford Cocks
    made. In 2001, Cocks developed one of the first secure identity-based encryption (IBE) schemes, based on assumptions about quadratic residues in composite...
    11 KB (1,034 words) - 15:39, 5 July 2024
  • Thumbnail for Dan Boneh
    derived from the recipients identity. Boneh, with Matt Franklin, proposed one of the first identity-based encryption schemes based on the Weil pairing. The...
    14 KB (1,150 words) - 03:27, 4 July 2024
  • Sakai–Kasahara scheme (category Identity-based cryptography)
    scheme, also known as the Sakai–Kasahara key encryption algorithm (SAKKE), is an identity-based encryption (IBE) system proposed by Ryuichi Sakai and Masao...
    10 KB (1,588 words) - 06:26, 31 July 2024
  • Boneh–Franklin scheme (category Identity-based cryptography)
    The Boneh–Franklin scheme is an identity-based encryption system proposed by Dan Boneh and Matthew K. Franklin in 2001. This article refers to the protocol...
    6 KB (1,142 words) - 11:11, 13 February 2024
  • Identity-based conditional proxy re-encryption (IBCPRE) is a type of proxy re-encryption (PRE) scheme in the identity-based public key cryptographic setting...
    15 KB (2,150 words) - 15:16, 14 December 2023
  • Thumbnail for Public-key cryptography
    Off-the-Record Messaging Books on cryptography GNU Privacy Guard Identity-based encryption (IBE) Key escrow Key-agreement protocol PGP word list Post-quantum...
    36 KB (4,186 words) - 17:35, 15 August 2024
  • Certificate-based encryption is a system in which a certificate authority uses ID-based cryptography to produce a certificate. This system gives the users...
    2 KB (332 words) - 12:15, 21 November 2022