1 research outputs found

    An efficient classification in IBE Provide with an improvement of BB2 to an efficient Commutative Blinding scheme

    Full text link
    Because of the revolution and the success of the technique IBE (Identification Based Encryption) in the recent years. The need is growing to have a standardization to this technology to streamline communication based on it. But this requires a thorough study to extract the strength and weakness of the most recognized cryptosystems. Our first goal in this work is to approach to this standardization, by applying a study which permit to extract the best cryptosystems. As we will see in this work and as Boneh and Boyen said in 2011 (Journal of Cryptology) the BB1 and BB2 are the most efficient schemes in the model selective ID and without random oracle (they are the only schemes traced in this model). This is right as those schemes are secure (under this model), efficient and useful for some applications. Our second goal behind this work is to make an approvement in BB2 to admit a more efficient schemes. We will study the security of our schemes, which is basing on an efficient strong Diffie-Hellman problem compared to BB1 and BB2. More than that our HIBE support s+ID-HIBE compared to BBG (Boneh Boyen Goh). Additionally the ID in our scheme will be in Zp instead of Zp* as with BBG. We will cite more clearly all these statements in in this article.Comment: Pages: 34 No figures 6 Tale
    corecore