[Resource Topic] 2002/072: Authenticated Identity-Based Encryption

Welcome to the resource topic for 2002/072

Title:
Authenticated Identity-Based Encryption

Authors: Ben Lynn

Abstract:

Suppose Alice wishes to send a message to Bob using an identity-based
encryption scheme (recall such a scheme is a public key cryptosystem where
any string is a valid public key), but desires integrity as well as
security. In other words, Alice wants Bob to know that only she could have
sent the message. Furthermore, suppose
she does not want the non-repudiation property
that would necessarily be present if she simply used an identity-based
signature scheme i.e. she does not want Bob to be able to prove
to a third party
that she is the sender.

We augment the system of Boneh and Franklin
to allow communication with integrity without nonrepudiation.
We formalize notions of security and integrity for our scheme, and show that
new encryption and decryption
algorithms are more efficient, despite being equally secure
and authenticated.

ePrint: https://eprint.iacr.org/2002/072

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .