Team for Research in
Ubiquitous Secure Technology

• Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption.
D. Boneh, J. Katz

Citation
D. Boneh, J. Katz. "• Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption.". RSA-CT, 87-103, 2005.

Abstract
Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption from identity-based encryption in the standard model. We improve the efficiency of their construction, and show two specific instantiations of our resulting scheme which offer the most efficient encryption (and, in one case, key generation) of any CCA-secure encryption scheme to date in the standard model.

Electronic downloads

Citation formats  
  • HTML
    D. Boneh, J. Katz. <a
    href="http://www.truststc.org/pubs/608.html"
    >•	Improved Efficiency for CCA-Secure
    Cryptosystems Built Using Identity Based
    Encryption.</a>, RSA-CT, 87-103, 2005.
  • Plain text
    D. Boneh, J. Katz. "•	Improved Efficiency
    for CCA-Secure Cryptosystems Built Using Identity Based
    Encryption.". RSA-CT, 87-103, 2005.
  • BibTeX
    @inproceedings{BonehKatz05_ImprovedEfficiencyForCCASecureCryptosystemsBuilt,
        author = {D. Boneh and J. Katz},
        title = {•	Improved Efficiency for CCA-Secure
                  Cryptosystems Built Using Identity Based
                  Encryption.},
        booktitle = {RSA-CT},
        pages = {87-103},
        year = {2005},
        abstract = {Recently, Canetti, Halevi, and Katz showed a
                  general method for constructing CCA-secure
                  encryption from identity-based encryption in the
                  standard model. We improve the efficiency of their
                  construction, and show two specific instantiations
                  of our resulting scheme which offer the most
                  efficient encryption (and, in one case, key
                  generation) of any CCA-secure encryption scheme to
                  date in the standard model. },
        URL = {http://www.truststc.org/pubs/608.html}
    }
    

Posted by Jessica Gamble on 16 Mar 2009.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.