Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Communications of the ACM
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Efficient revocation and threshold pairing based cryptosystems
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Pseudonym management using mediated identity-based cryptography
Proceedings of the 2005 workshop on Digital identity management
A method for fast revocation of public key certificates and security capabilities
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Simple identity-based cryptography with mediated RSA
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Proceedings of the 5th international conference on Pervasive services
Hi-index | 0.00 |
Motivated by pseudonym management in a Location-Based Services (LBS) platform, we describe a mediated identity-based encryption (mIBE) scheme that can be used to protect identities and communications in this environment. We introduce a process whereby a mobile user is only required to own one private key in order to protect their communications when accessing LBS under different pseudonyms. The identity-based character of the scheme simplifies key management by removing the need for digital certificates and the mediated architecture allows for simple, instant key revocation.