
AbstractRecently, Saxena and Soh presented one novel cryptographic primitive based on associative one-way functions, called oracle-based group with infeasible inversion (O-GII), and it requires the order of group is hidden. In this paper, we propose three ID-based cryptographic schemes, such as ID-based non-interactive key sharing (ID-NIKS) scheme, hierarchical ID-based encryption (HIBE) scheme, and ID-based signature (IBS) scheme, based on hidden-order groups. We say that the security proof of our proposed schemes is an open problem.
ID-based signature, Hierarchical ID-based encryption, ID-based non-interactive key sharing, Group inversion problem, Engineering(all)
ID-based signature, Hierarchical ID-based encryption, ID-based non-interactive key sharing, Group inversion problem, Engineering(all)
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 1 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
