<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
AbstractRecently, Saxena and Soh presented one novel cryptographic primitive based on associative one-way functions, called oracle-based group with infeasible inversion (O-GII), and it requires the order of group is hidden. In this paper, we propose three ID-based cryptographic schemes, such as ID-based non-interactive key sharing (ID-NIKS) scheme, hierarchical ID-based encryption (HIBE) scheme, and ID-based signature (IBS) scheme, based on hidden-order groups. We say that the security proof of our proposed schemes is an open problem.
ID-based signature, Hierarchical ID-based encryption, ID-based non-interactive key sharing, Group inversion problem, Engineering(all)
ID-based signature, Hierarchical ID-based encryption, ID-based non-interactive key sharing, Group inversion problem, Engineering(all)
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 1 | |
popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |