Back to Results
First PageMeta Content
Vehicle Identification Number / Stool-or-mat / Vulture / Bread bun / Egyptian hieroglyphs / Cryptography / ID-based encryption


An extended abstract of this work appeared in the proceedings of CRYPTO[removed]This is the full version. (Hierarchical) Identity-Based Encryption from Affine Message Authentication Olivier Blazy1
Add to Reading List

Document Date: 2014-07-25 11:30:50


Open Document

File Size: 860,86 KB

Share Result on Facebook

City

Introduction Identity / /

Company

G2 / G1 / GT / /

Country

Germany / /

Currency

pence / /

/

Event

Reorganization / /

Facility

Mathematics Horst Görtz Institute / /

Holiday

Assumption / /

IndustryTerm

asymmetric pairing / decryption algorithm / hash proof systems / user secret key generation algorithm / smooth projective hash proof systems / /

Organization

German Israel Foundation / German Federal Ministry for Education and Research / Affine Message Authentication Olivier Blazy1 Eike Kiltz2 Jiaxin Pan3 Faculty of Mathematics Horst Görtz Institute for IT-Security Ruhr University Bochum / General Services Administration / /

Person

LIN SXDH SXDH / Wc / Chen / Wee / LIN DBDH / /

Position

IND-CPA / Prime Minister / second author / /

ProvinceOrState

Georgia / /

Technology

Encryption / chosenciphertext secure encryption / public key / user secret key generation algorithm / public-key encryption / 1 Introduction Identity-based encryption / hierarchical identity-based encryption / identity-based encryption / secret key / simulation / decryption algorithm / attribute-based encryption / be done using a user secret key / /

SocialTag