IBE in Adaptive-Identity Model Without Random Oracles



In the previous chapters, we have seen several IBE schemes and their extension to HIBE. As mentioned in Chapter 2, the security model for IBE schemes was introduced by Boneh and Franklin and allows the adversary to make both adaptiveidentity and adaptive-chosen ciphertext attacks. So, a natural goal is to obtain schemes which can be proved secure in this model under the assumption that some computational problem is hard to solve.




Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  1. 1.Department of Computer Science and AutomationIndian Institute of ScienceBangaloreIndia
  2. 2.Applied Statistics UnitIndian Statistical InstituteKolkataIndia

Personalised recommendations