Skip to main content

Identity-Based Encryption

  • Reference work entry
Encyclopedia of Cryptography and Security

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Boneh D, Canetti R, Halevi S, Katz J (2006) Chosen-ciphertext security from Identity-based encryption. SIAM J Comput 36(5):915–942

    MathSciNet  Google Scholar 

  2. Boneh D, Franklin M (2001) Identity based encryption scheme from the weil pairing. In: Kilian J (ed) Advances in cryptology – CRYPTO 2001. Lecture notes in computer science, vol 2139. Springer-Verlag, Berlin, pp 213–229

    Google Scholar 

  3. Boneh D, Gentry C, Hamburg M (2007) Space-efficient identity based encryption without pairings. In: Proceedings of the 48th annual IEEE symposium on foundations of computer science – FOCS 2007, Providence, RI. IEEE Computer Society, Los Alamitos, CA, pp 647–657

    Google Scholar 

  4. Cocks C (2001) An identity based encryption scheme based on quadratic residues. In: Proceedings of the 8th IMA international conference on cryptography and coding, Cirencester, UK. Lecture notes in computer science, vol 2260. Springer-Verlag, Berlin, pp 360–363

    Google Scholar 

  5. Gentry C (2006) Practical identity-based encryption without random oracles. In: Vaudenay S (ed) Advances in cryptology – EUROCRYPT 2006. Lecture notes in computer science, vol 4004. Springer-Verlag, Berlin, pp 445–464

    Google Scholar 

  6. Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the 40th annual ACM symposium on theory of computing – STOC 2008, Victoria, BC. ACM, New York, pp 197–206

    Google Scholar 

  7. Gentry C, Silverberg A (2002) Hierarchical ID-based cryptography. In: Zheng Y (ed) Advances in cryptology – ASIACRYPT 2002. Lecture notes in computer science, vol 2501. Springer-Verlag, Berlin, pp 149–155

    Google Scholar 

  8. Shamir A (1985) Identity-based cryptosystems and signature schemes. In: Blakley GR, Chaum D (eds) Advances in cryptology – CRYPTO 84. Lecture notes in computer science, vol 196. Springer, Berlin, pp 47–53

    Google Scholar 

  9. Waters B (2005) Efficient identity-based encryption without random oracles. In: Cramer R (ed) Advances in cryptology – EUROCRYPT 2005. Lecture notes in computer science, vol 3494. Springer-Verlag, Berlin, pp 114–127

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Gagné, M. (2011). Identity-Based Encryption. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_148

Download citation

Publish with us

Policies and ethics