Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption schemes from identity-based encryption schemes in the standard model. We improve the efficiency of their construction, and show two specific instantiations of our resulting scheme which offer the most efficient encryption (and, in one case, key generation) of any CCA-secure encryption scheme to date. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Boneh, D., & Katz, J. (2005). Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In Lecture Notes in Computer Science (Vol. 3376, pp. 87–103). Springer Verlag. https://doi.org/10.1007/978-3-540-30574-3_8
Mendeley helps you to discover research relevant for your work.