Paper 2007/316
SECURITY PROOF FOR SHENGBAO WANG’S IDENTITY-BASED ENCRYPTION SCHEME
Sunder Lal and Priyam Sharma
Abstract
This paper analyzes the security of an IBE scheme proposed by Wang in 2007. It is shown that under BDHP (which is polynomially time equivalent to BIDHP) assumption the scheme is secure in random oracle model.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Contact author(s)
-
sunder_lal2 @ rediffmail com
priyam_sharma ibs @ rediffmail com - History
- 2007-08-23: last of 2 revisions
- 2007-08-16: received
- See all versions
- Short URL
- https://ia.cr/2007/316
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2007/316, author = {Sunder Lal and Priyam Sharma}, title = {{SECURITY} {PROOF} {FOR} {SHENGBAO} {WANG}’S {IDENTITY}-{BASED} {ENCRYPTION} {SCHEME}}, howpublished = {Cryptology {ePrint} Archive, Paper 2007/316}, year = {2007}, url = {https://eprint.iacr.org/2007/316} }