Content deleted Content added
→Encryption schemes: _ -> - |
|||
Line 38:
* [[Boneh–Franklin scheme|Boneh–Franklin]] (BF-IBE).
* [[Sakai–Kasahara scheme|Sakai–Kasahara]] (SK-IBE).<ref>{{cite journal|last1=Sakai|first1=Ryuichi|last2=Kasahara|first2=Masao|title=ID Based cryptosystems with pairing on elliptic curve|journal=Cryptography ePrint Archive|year=2003|volume=2003/054|url=https://eprint.iacr.org/2003/054.pdf}}</ref>
* Boneh–Boyen (
All these algorithms have [[Provable security|security proofs]].
|