Improved efficiency for CCA-secure cryptosystems built using identity-based encryption

214Citations
Citations of this article
44Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption schemes from identity-based encryption schemes in the standard model. We improve the efficiency of their construction, and show two specific instantiations of our resulting scheme which offer the most efficient encryption (and, in one case, key generation) of any CCA-secure encryption scheme to date. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Boneh, D., & Katz, J. (2005). Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In Lecture Notes in Computer Science (Vol. 3376, pp. 87–103). Springer Verlag. https://doi.org/10.1007/978-3-540-30574-3_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free