Efficient identity-based key encapsulation to multiple parties

33Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We introduce the concept of identity based key encapsulation to multiple parties (mID-KEM), and define a security model for it. This concept is the identity based analogue of public key KEM to multiple parties. We also analyse possible mID-KEM constructions, and propose an efficient scheme based on bilinear pairings. We prove our scheme secure in the random oracle model under the Gap Bilinear Diffie-Hellman assumption. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Barbosa, M., & Farshim, P. (2005). Efficient identity-based key encapsulation to multiple parties. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3796 LNCS, pp. 428–441). https://doi.org/10.1007/11586821_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free