Identity-based encryption: Difference between revisions

Content deleted Content added
Casperctc (talk | contribs)
Line 38:
* [[Boneh–Franklin scheme|Boneh–Franklin]] (BF-IBE).
* [[Sakai–Kasahara scheme|Sakai–Kasahara]] (SK-IBE).<ref>{{cite journal|last1=Sakai|first1=Ryuichi|last2=Kasahara|first2=Masao|title=ID Based cryptosystems with pairing on elliptic curve|journal=Cryptography ePrint Archive|year=2003|volume=2003/054|url=https://eprint.iacr.org/2003/054.pdf}}</ref>
* Boneh–Boyen (BB_IBEBB-IBE).<ref>{{cite journal|last1=Boneh|first1=Dan|last2=Boyen|first2=X|title=Efficient selective-ID secure identity based encryption without random oracles|journal=LNCS|year=2004|volume=3027|series=Advances in Cryptography - EUROCRYPT 2004|pages=223–238|publisher=Springer-Verlag|doi=10.1007/978-3-540-24676-3_14}}</ref>
All these algorithms have [[Provable security|security proofs]].