Efficient Identity-Based Key Encapsulation to Multiple Parties
- Cite this paper as:
- Barbosa M., Farshim P. (2005) Efficient Identity-Based Key Encapsulation to Multiple Parties. In: Smart N.P. (eds) Cryptography and Coding. Cryptography and Coding 2005. Lecture Notes in Computer Science, vol 3796. Springer, Berlin, Heidelberg
We introduce the concept of identity based key encapsulation to multiple parties (mID-KEM), and define a security model for it. This concept is the identity based analogue of public key KEM to multiple parties. We also analyse possible mID-KEM constructions, and propose an efficient scheme based on bilinear pairings. We prove our scheme secure in the random oracle model under the Gap Bilinear Diffie-Hellman assumption.
KeywordsKey Encapsulation Mechanism (KEM) Hybrid Encryption Identity Based Cryptography Provable Security
Unable to display preview. Download preview PDF.