References
Barreto, P.-S.-L.M. (2002). The Pairing Based Crypto Lounge. Web page located at http://planeta.terra.com.br/informatica/paulobarreto/pblounge.html
Al-Riyami, S. and K.G. Paterson (2003). āCertificateless public key cryptography.ā Eprint available at http://eprint.iacr.org/2003/126/
Bellare, M. and P. Rogaway (1993). āRandom oracles are practical: A paradigm for designing efficient protocols.ā Proc. of the 1st ACM Conference on Computer and Communications Security, 62ā73.
Boneh, D., X. Ding, G. Tsudik, and M. Wong (2001). āA method for fast revocation of public key certificates and security capabilities.ā Proceedings of the 10th USENIX Security Symposium, 297ā308.
Boneh, D. and M. Franklin (2001). āIdentity based encryption from the Weil pairing.ā Advances in CryptologyāCRYPTO 2001, Lecture Notes in Computer Science, vol. 2139, ed. J. Kilian. Springer-Verlag, Berlin, 213ā229.
Boneh, D. and M. Franklin (2003). āIdentity based encryption from the Weil pairing.ā SIAM J. of Computing, 32 (3), 586ā615, extended version of [5].
Boneh, D., C. Gentry, B. Lynn, and H. Shacham (2003). āAggregate and verifiably encrypted signatures from bilinear maps.ā Advances in CryptologyāEUROCRYPT'03, Lecture Notes in Computer Science, vol. 2656, ed. E. Biham. Springer, Berlin, 416ā432.
Boneh, D., B. Lynn, and H. Shacham (2001). āShort signatures from the Weil pairing.ā Advances in CryptographyāASIACRYPT 2001, Lecture Notes in Computer Science, vol. 2248, ed. C. Boyd. Springer, Berlin, 514ā532.
Boyen, X. (2003). āMultipurpose identity-based signcryption: A swiss army knife for identity-based cryptography.ā Advances in CryptologyāCRYPTO 2003, Lecture Notes in Computer Science, vol. 2729, ed. D. Boneh. Springer-Verlag, Berlin, 382ā398.
Canetti, R., S. Halevi, and J. Katz (2003). āA forward-secure public-key encryption scheme.ā Advances in CryptologyāEUROCRYPT 2003, Lecture Notes in Computer Science, vol. 2656, ed. E. Biham. Springer, Berlin, 255ā271.
Cha, J.C. and J.H. Cheon (2003). āAn identity-based signature from gap DiffieāHellman groups.ā Proceedings of PKC 2003, Lecture Notes in Computer Science, vol. 2567, ed. Y.G. Desmedt. Springer-Verlag, Berlin, 18ā30.
Cocks, C. (2001). āAn identity based encryption scheme based on quadratic residues.ā Proc. of Cryptography and Coding, Lecture Notes in Computer Science, vol. 2260, ed. B. Honary. Springer, Berlin, 360ā363.
Fiat, A. and A. Shamir (1986). āHow to prove yourself: practical solutions to identification and signature problems.ā Advances in CryptologyāCRYPTO'86, Lecture Notes in Computer Science, vol. 263, ed. A. Odlyzko. Springer-Verlag, Berlin, 186ā194.
Fujisaki, E. and T. Okamoto (1999). āSecure integration of asymmetric and symmetric encryption schemes.ā Advances in CryptologyāCRYPTO'99, Lecture Notes in Computer Science, vol. 1666, ed. J. Wiener. Springer-Verlag, Berlin, 537ā554.
Gentry, C. (2003). āCertificate-based encryption and the certificate revocation problem.ā Advances in CryptologyāEUROCRYPT 2003, Lecture Notes in Computer Science, vol. 2656, ed. E. Biham. Springer-Verlag, Berlin, 272ā293.
Gentry, C. and A. Silverberg (2002). āHierarchical ID-based cryptography.ā Advances in CryptographyāASIACRYPT 2002, Lecture Notes in Computer Science, vol. 2501, ed. Y. Zheng. Springer-Verlag, Berlin, 548ā566.
Guillou, L. and J.-J. Quisquater (1988). āA paradoxical identity-based signature scheme resulting from zero-knowledge.ā Advances in CryptologyāCRYPTO'88, Lecture Notes in Computer Science, vol. 403, ed. S. Goldwasser. Springer-Verlag, Berlin, 216ā231.
Hess, F. (2003). āEfficient identity based signature schemes based on pairings.ā Proceedings of SAC 2002, Lecture Notes in Computer Science, vol. 2595, eds. K. Nyberg and H.M. Heys. Springer-Verlag, Berlin, 310ā324.
Horwitz, J. and B. Lynn (2002). āToward hierarchical identity-based encryption.ā Advances in CryptologyāEUROCRYPT 2002, Lecture Notes in Computer Science, vol. 2332, ed. L. Knudsen. Springer-Verlag, Berlin, 466ā481.
Joux, A. (2000). āA one round protocol for tripartite DiffieāHellman.ā Proc. of ANTS-IV, Lecture Notes in Computer Science, vol. 1838, ed. W. Bosma. Springer-Verlag, Berlin, 385ā394.
Joux, A. and K. Nguyen (2001). āSeparating decision DiffieāHellman from DiffieāHellman in cryptographic groups.ā Eprint available at http://eprint.iacr.org/2001/003/
Menezes, A.J., T. Okamoro, and S. Vanstone (1993). āReducing elliptic curve logarithms to logarithms in a finite field.ā IEEE Trans. on Inf. Theory, 39, 1639ā1646.
Menezes, A.J. (1995). Elliptic Curve Public Key Cryptosystems (2nd ed.). Kluwer Academic Publishers, Boston, MA.
Okamoto, T. and D. Pointcheval (2001). āThe gap-problems: a new class of problems for the security of cryptographic schemes.ā Proc. of of PKC 2001, Lecture Notes in Computer Science, vol. 1992, ed. K. Kim. Springer-Verlag, Berlin, 104ā118.
Paterson, K.G. (2002). āID-based signatures from pairings on elliptic curves.ā Available on http://eprint.iacr.org/2002/004/
Pointcheval, D. and J. Stern (1996). āSecurity proofs for signature schemes.ā Advances in CryptologyāEUROCRYPT'96, Lecture Notes in Computer Science, vol. 1070, ed. U. Maurer. Springer-Verlag, Berlin, 387ā398.
Pointcheval, D. and J. Stern (2000). āSecurity arguments for digital signatures and blind signatures.ā Journal of Cryptology, 13 (3), 361ā396.
Sakai, R., K. Ohgishi, and M. Kasahara (2000). āCryptosystems based on pairing.ā The 2000 Sympsium on Cryptography and Information Security, Okinawa, Japan.
Shamir, A. (1984). āIdentity based cryptosystems and signature schemes.ā Advances in CryptologyāCRYPTO'84, Lecture Notes in Computer Science, vol. 196, eds. G.R. Blakley and D. Chaum. Springer-Verlag, Berlin.
Smart, N.P. (2002). āAn identity based authenticated key agreement protocol based on the Weil pairing.ā Electronic Letters, 38 (13), 630ā632.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2005 International Federation for Information Processing
About this entry
Cite this entry
Libert, B., Quisquater, JJ. (2005). Identity-Based Cryptosystems. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_192
Download citation
DOI: https://doi.org/10.1007/0-387-23483-7_192
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23473-1
Online ISBN: 978-0-387-23483-0
eBook Packages: Computer ScienceReference Module Computer Science and Engineering