|
|
1 | (12) |
|
|
1 | (7) |
|
1.2 Identity-Based Encryption |
|
|
8 | (1) |
|
|
9 | (4) |
|
2 Definitions and Notations |
|
|
13 | (16) |
|
2.1 Public Key Encryption |
|
|
13 | (3) |
|
2.2 Identity-Based Encryption |
|
|
16 | (3) |
|
2.2.1 Hierarchical Identity-Based Encryption |
|
|
17 | (2) |
|
2.3 Security Model for (H)IBE |
|
|
19 | (7) |
|
2.3.1 Chosen Ciphertext Attack |
|
|
20 | (2) |
|
2.3.2 Chosen Plaintext Attack |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
2.3.5 Use of Random Oracles |
|
|
25 | (1) |
|
2.4 Structure of Security Proofs |
|
|
26 | (2) |
|
|
28 | (1) |
|
3 A Brief Background on Elliptic Curves and Pairings |
|
|
29 | (20) |
|
3.1 Finite Fields, Elliptic Curves and Tate Pairing |
|
|
30 | (14) |
|
3.1.1 Exponentiation in General Cyclic Groups |
|
|
30 | (2) |
|
|
32 | (1) |
|
|
33 | (6) |
|
|
39 | (4) |
|
|
43 | (1) |
|
|
44 | (4) |
|
|
48 | (1) |
|
4 Boneh-Franklin IBE and its Variants |
|
|
49 | (14) |
|
|
49 | (8) |
|
4.1.1 Security Against Chosen Ciphertext Attacks |
|
|
54 | (3) |
|
4.2 Hierarchical Identity-Based Encryption |
|
|
57 | (2) |
|
4.3 Boneh-Katz-Wang CPA-Secure IBE |
|
|
59 | (1) |
|
4.4 Attrapadung et al's CCA-Secure IBE |
|
|
60 | (1) |
|
|
61 | (2) |
|
5 Selective-Identity Model |
|
|
63 | (8) |
|
|
64 | (3) |
|
|
65 | (2) |
|
5.2 Constant Size Ciphertext HIBE |
|
|
67 | (2) |
|
5.3 Interpreting Security Models |
|
|
69 | (1) |
|
|
70 | (1) |
|
6 Security Against Adaptive Chosen Ciphertext Attacks |
|
|
71 | (10) |
|
6.1 A High Level Description |
|
|
72 | (1) |
|
6.2 Canetti-Halevi-Katz Transformation |
|
|
72 | (4) |
|
6.2.1 One-Time Signatures |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (2) |
|
6.3 The Boyen-Mei-Waters Transformation |
|
|
76 | (4) |
|
|
80 | (1) |
|
7 IBE in Adaptive-Identity Model Without Random Oracles |
|
|
81 | (18) |
|
|
82 | (1) |
|
|
83 | (10) |
|
|
84 | (9) |
|
7.3 Generalisation of Waters IBE |
|
|
93 | (1) |
|
7.4 Adaptive-Identity Secure HIBE |
|
|
93 | (1) |
|
7.5 Converting to a CCA-Secure HIBE |
|
|
94 | (3) |
|
7.6 Further Applications of Waters Technique |
|
|
97 | (1) |
|
|
98 | (1) |
|
8 Further IBE Constructions |
|
|
99 | (22) |
|
|
100 | (7) |
|
8.1.1 CPA-Secure Construction |
|
|
101 | (4) |
|
8.1.2 CCA-Secure Construction |
|
|
105 | (1) |
|
8.1.3 Previous and Further Work |
|
|
106 | (1) |
|
8.2 Dual System Encryption |
|
|
107 | (13) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
121 | (16) |
|
9.1 IBE Based on Number Theory |
|
|
122 | (3) |
|
|
122 | (1) |
|
9.1.2 Boneh-Gentry-Hamburg IBE |
|
|
123 | (2) |
|
|
125 | (9) |
|
9.2.1 Background on Lattices |
|
|
125 | (2) |
|
|
127 | (1) |
|
9.2.3 Gentry-Peikert-Vaikuntanathan IBE |
|
|
128 | (2) |
|
9.2.4 Generalized Pre-Image Sampling |
|
|
130 | (1) |
|
9.2.5 Agrawal-Boneh-Boyen IBE |
|
|
131 | (3) |
|
|
134 | (3) |
|
10 Applications, Extensions and Related Primitives |
|
|
137 | (18) |
|
|
137 | (6) |
|
10.1.1 Boneh-Lynn-Shacham Short Signature |
|
|
137 | (2) |
|
10.1.2 A Hierarchical Identity-Based Signature |
|
|
139 | (4) |
|
10.2 Identity-Based Key Agreement |
|
|
143 | (2) |
|
10.3 Broadcast Encryption |
|
|
145 | (3) |
|
10.4 Fuzzy Identity-Based Encryption |
|
|
148 | (1) |
|
10.5 Public Key Encryption with Keyword Search |
|
|
149 | (2) |
|
|
151 | (2) |
|
|
153 | (2) |
|
|
155 | (8) |
|
|
155 | (1) |
|
11.2 Certificate-Less Encryption |
|
|
156 | (2) |
|
11.3 Certificate-Based Encryption |
|
|
158 | (2) |
|
|
160 | (1) |
|
|
161 | (2) |
|
12 Products and Standards |
|
|
163 | (4) |
|
|
163 | (1) |
|
|
164 | (1) |
|
12.3 IEEE P1363.3/D1 Draft Standard |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (2) |
|
|
167 | (10) |
|
|
167 | (10) |
Index |
|
177 | |