Efficient identity-based encryption without random oracles
Citations
3,610 citations
3,128 citations
1,917 citations
1,834 citations
1,444 citations
Cites background from "Efficient identity-based encryption..."
...Several techniques used by SW were inspired by prior work on Identity-Based Encryption [36, 13, 23, 18, 10]....
[...]
...Other examples of encryption systems with more “structure” added include Hierarchical Identity-Based Encryption [28, 25] and Wildcard IBE [2]....
[...]
...Some of the roots of ABE can be traced back to Identity-Based Encryption [36, 13, 23, 18, 10, 41, 24, 14] (IBE)....
[...]
References
6,902 citations
5,110 citations
3,697 citations
"Efficient identity-based encryption..." refers methods in this paper
...For example, the signatures in the scheme of Boneh, Lynn, Shacham [7] correspond to private keys of the Boneh-Franklin IBE system....
[...]
3,150 citations
Additional excerpts
...Other efficient schemes that are secure against existential forgery under an adaptive chosen-message attack [14] in the standard model depend upon the Strong-RSA assumption [12, 11] or the Strong Diffie-Hellman assumption [3]....
[...]
1,917 citations