Hierarchical ID-based cryptography

被引:624
作者
Gentry, C [1 ]
Silverberg, A
机构
[1] DoCoMo USA Labs, San Jose, CA USA
[2] Ohio State Univ, Dept Math, Columbus, OH 43210 USA
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS | 2002年 / 2501卷
关键词
identity-based cryptography; hierarchical identity-based cryptography; elliptic curves; pairing-based cryptography;
D O I
10.1007/3-540-36178-2_34
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present hierarchical identity-based encryption schemes and signature schemes that have total collusion resistance on an arbitrary number of levels and that have chosen ciphertext security in the random oracle model assuming the difficulty of the Bilinear Diffie-Hellman problem.
引用
收藏
页码:548 / 566
页数:19
相关论文
共 17 条
[1]  
ALRIYAMI SS, AUTHENTICATED 3 PART
[2]  
Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
[3]  
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[4]  
Blundo C., 1993, LNCS, V740, P471
[5]  
Boneh D., 2001, LNCS, P514, DOI [DOI 10.1007/3-540-45682-1_30, DOI 10.1007/3-540-45682-130]
[6]  
BONEH D, 2001, LNCS, V2139
[7]  
Boneh Dan, IDENTITY BASED ENCRY
[8]  
Cocks Clifford., 2001, IMA Int. Conf., V2260, P360, DOI DOI 10.1007/3-540-45325-3
[9]  
Fujisaki E., 1999, LNCS, V1666, P537, DOI DOI 10.1007/3-540-48405-1_34
[10]  
Hanaoka G, 1999, LECT NOTES COMPUT SC, V1716, P348