Paper 2007/316

SECURITY PROOF FOR SHENGBAO WANG’S IDENTITY-BASED ENCRYPTION SCHEME

Sunder Lal and Priyam Sharma

Abstract

This paper analyzes the security of an IBE scheme proposed by Wang in 2007. It is shown that under BDHP (which is polynomially time equivalent to BIDHP) assumption the scheme is secure in random oracle model.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Contact author(s)
sunder_lal2 @ rediffmail com
priyam_sharma ibs @ rediffmail com
History
2007-08-23: last of 2 revisions
2007-08-16: received
See all versions
Short URL
https://ia.cr/2007/316
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2007/316,
      author = {Sunder Lal and Priyam Sharma},
      title = {{SECURITY} {PROOF} {FOR} {SHENGBAO} {WANG}’S {IDENTITY}-{BASED} {ENCRYPTION} {SCHEME}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2007/316},
      year = {2007},
      url = {https://eprint.iacr.org/2007/316}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.