IBE in Adaptive-Identity Model Without Random Oracles
In the previous chapters, we have seen several IBE schemes and their extension to HIBE. As mentioned in Chapter 2, the security model for IBE schemes was introduced by Boneh and Franklin and allows the adversary to make both adaptiveidentity and adaptive-chosen ciphertext attacks. So, a natural goal is to obtain schemes which can be proved secure in this model under the assumption that some computational problem is hard to solve.
Unable to display preview. Download preview PDF.