Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Toward Hierarchical Identity-Based Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Hierarchical ID-Based Cryptography
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Hierarchical identity based encryption with constant size ciphertext
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Generalization of the Selective-ID security model for HIBE protocols
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Hi-index | 0.00 |
At PKC 2006, Chatterjee and Sarkar gave a generalization of the selective-ID security model for hierarchical identity-based encryption (HIBE). Corresponding to HIBE, in this paper, a generalization of the selective-ID security model for hierarchical identity-based signature (HIBS) is first proposed. They yield a complete generalization of the selective-ID security model for hierarchical identity-based cryptosystem. We introduce two security models which allow the adversary to commit to a set of identities and in the forgery phase choose any of the previously committed identities. Two constructions of HIBS are presented which can be proved to be secure in the two models. Furthermore, one of the HIBS schemes supports an unbounded number of levels.