Implementation of Algorithms for Identity Based Encryption and Decryption

[1]  Daniel R. Simon,et al.  Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.

[2]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[3]  Moni Naor,et al.  Nonmalleable Cryptography , 2000, SIAM Rev..

[4]  Toshiya Itoh,et al.  An ID-based cryptosystem based on the discrete logarithm problem , 1989, IEEE J. Sel. Areas Commun..

[5]  Yan Gu,et al.  A Performance Analysis of Identity-Based Encryption Schemes , 2011, INTRUST.

[6]  Tatsuaki Okamoto,et al.  On Pairing-Based Cryptosystems , 2006, VIETCRYPT.

[7]  Hugo Krawczyk,et al.  Public-key cryptography and password protocols , 1999 .

[8]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[9]  Clifford C. Cocks An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.

[10]  Dong Hoon Lee,et al.  Anonymous HIBE with short ciphertexts: full security in prime order groups , 2013, Designs, Codes and Cryptography.

[11]  Ben Lynn,et al.  Toward Hierarchical Identity-Based Encryption , 2002, EUROCRYPT.

[12]  Ben Lynn,et al.  Authenticated Identity-Based Encryption , 2002, IACR Cryptol. ePrint Arch..

[13]  Ichiro Hasuo,et al.  Security Notions for Identity Based Encryption , 2005, IACR Cryptol. ePrint Arch..

[14]  Sriramkrishnan Srinivasan,et al.  Identity based encryption: Progress and challenges , 2010, Inf. Secur. Tech. Rep..

[15]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[16]  Fuchun Guo,et al.  Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption , 2016, IEEE Trans. Inf. Forensics Secur..

[17]  Brent Waters,et al.  Identity-Based Encryption Secure against Selective Opening Attack , 2011, TCC.

[18]  Ratna Dutta,et al.  Pairing-Based Cryptographic Protocols : A Survey , 2004, IACR Cryptol. ePrint Arch..

[19]  Eiji Okamoto,et al.  Key distribution system based on identification information , 1989, IEEE J. Sel. Areas Commun..

[20]  Brent Waters,et al.  Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..

[21]  Chandrashekhar Meshram,et al.  An ID-Based Public Key Cryptosystem based on Integer Factoring and Double Discrete Logarithm Problem , 2010 .

[22]  Masao Kasahara,et al.  ID based Cryptosystems with Pairing on Elliptic Curve , 2003, IACR Cryptol. ePrint Arch..

[23]  David Pointcheval,et al.  On the Security Notions for Public-Key Encryption Schemes , 2004, SCN.

[24]  Fuchun Guo,et al.  Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices , 2017, IEEE Transactions on Dependable and Secure Computing.

[25]  Brent Waters,et al.  Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.