{"id":"https://openalex.org/W2061222923","doi":"https://doi.org/10.1145/1755688.1755699","title":"Identity-based encryption based on DHIES","display_name":"Identity-based encryption based on DHIES","publication_year":2010,"publication_date":"2010-04-13","ids":{"openalex":"https://openalex.org/W2061222923","doi":"https://doi.org/10.1145/1755688.1755699","mag":"2061222923"},"language":"en","primary_location":{"id":"doi:10.1145/1755688.1755699","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1755688.1755699","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100402120","display_name":"Yu Chen","orcid":"https://orcid.org/0000-0003-2553-1281"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Chen","raw_affiliation_strings":["Peking University, China"],"affiliations":[{"raw_affiliation_string":"Peking University, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052041554","display_name":"Manuel Charlemagne","orcid":null},"institutions":[{"id":"https://openalex.org/I42934936","display_name":"Dublin City University","ror":"https://ror.org/04a1a1e81","country_code":"IE","type":"education","lineage":["https://openalex.org/I42934936"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Manuel Charlemagne","raw_affiliation_strings":["Dublin City University, Ireland","Dublin, City University, Ireland"],"affiliations":[{"raw_affiliation_string":"Dublin City University, Ireland","institution_ids":["https://openalex.org/I42934936"]},{"raw_affiliation_string":"Dublin, City University, Ireland","institution_ids":["https://openalex.org/I42934936"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005225068","display_name":"Zhi Guan","orcid":"https://orcid.org/0000-0002-6144-4815"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Guan","raw_affiliation_strings":["Peking University, China"],"affiliations":[{"raw_affiliation_string":"Peking University, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113779390","display_name":"Jianbin Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianbin Hu","raw_affiliation_strings":["Peking University, China"],"affiliations":[{"raw_affiliation_string":"Peking University, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103573831","display_name":"Zhong Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhong Chen","raw_affiliation_strings":["Peking University, China"],"affiliations":[{"raw_affiliation_string":"Peking University, China","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100402120"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":1.8058,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.8722509,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"82","last_page":"88"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.6237168908119202},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6060845851898193},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5691502690315247},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.5281096696853638},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5193229913711548},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.49152955412864685},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4908631443977356},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.47839272022247314},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.474418580532074},{"id":"https://openalex.org/keywords/plaintext-aware-encryption","display_name":"Plaintext-aware encryption","score":0.4632291793823242},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.4625527262687683},{"id":"https://openalex.org/keywords/ciphertext-indistinguishability","display_name":"Ciphertext indistinguishability","score":0.4368303716182709},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.40519291162490845},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29207897186279297}],"concepts":[{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.6237168908119202},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6060845851898193},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5691502690315247},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.5281096696853638},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5193229913711548},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.49152955412864685},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4908631443977356},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.47839272022247314},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.474418580532074},{"id":"https://openalex.org/C119133118","wikidata":"https://www.wikidata.org/wiki/Q7200761","display_name":"Plaintext-aware encryption","level":5,"score":0.4632291793823242},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.4625527262687683},{"id":"https://openalex.org/C182776695","wikidata":"https://www.wikidata.org/wiki/Q840661","display_name":"Ciphertext indistinguishability","level":5,"score":0.4368303716182709},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.40519291162490845},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29207897186279297}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1755688.1755699","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1755688.1755699","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5699999928474426}],"awards":[{"id":"https://openalex.org/G4292254420","display_name":null,"funder_award_id":"07/RFP/CMSF428","funder_id":"https://openalex.org/F4320320847","funder_display_name":"Science Foundation Ireland"}],"funders":[{"id":"https://openalex.org/F4320320847","display_name":"Science Foundation Ireland","ror":"https://ror.org/0271asj38"},{"id":"https://openalex.org/F4320322725","display_name":"China Scholarship Council","ror":"https://ror.org/04atp4p48"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1493241500","https://openalex.org/W1516512945","https://openalex.org/W1518817958","https://openalex.org/W1562630396","https://openalex.org/W1569083856","https://openalex.org/W1603068992","https://openalex.org/W1610688607","https://openalex.org/W1637905077","https://openalex.org/W1675339804","https://openalex.org/W1797206029","https://openalex.org/W1996360405","https://openalex.org/W2011039300","https://openalex.org/W2070723543","https://openalex.org/W2086042811","https://openalex.org/W2097638666","https://openalex.org/W2108834246","https://openalex.org/W2117635739","https://openalex.org/W2149093588","https://openalex.org/W2152924492","https://openalex.org/W2951337103","https://openalex.org/W4232836212","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W642810354","https://openalex.org/W1929726994","https://openalex.org/W2610451531","https://openalex.org/W1534919675","https://openalex.org/W376710638","https://openalex.org/W2116556172","https://openalex.org/W2950231904","https://openalex.org/W1573119639","https://openalex.org/W2312628401","https://openalex.org/W3122472549"],"abstract_inverted_index":{"Most":[0],"traditional":[1],"public":[2,27,119],"key":[3,14,33,58,120],"cryptosystems":[4],"are":[5],"constructed":[6],"upon":[7],"algebraically":[8],"rich":[9],"structures,":[10],"which":[11],"makes":[12],"their":[13,25],"pairs":[15],"combinable,":[16],"i.e.,":[17],"the":[18,50,86,143,154],"combination":[19,59],"of":[20,70,157],"some":[21],"private":[22],"keys":[23,28],"and":[24,122],"corresponding":[26],"could":[29],"form":[30],"a":[31,42,68],"new":[32,65],"pair.":[34],"Exploring":[35],"such":[36],"combinable":[37],"property,":[38],"this":[39],"paper":[40],"proposes":[41],"novel":[43],"Identity-Based":[44],"Encryption":[45,53],"(IBE)":[46],"scheme":[47,66,135,159],"based":[48,103],"on":[49,104],"Diffie-Hellman":[51],"Integrated":[52],"Scheme":[54],"(DHIES)":[55],"with":[56,99],"quadratic":[57],"structure":[60],"from":[61,93],"bilinear":[62],"maps.":[63],"The":[64],"has":[67],"number":[69],"advantages":[71],"over":[72],"other":[73],"IBE":[74,111],"schemes.":[75],"First,":[76],"it":[77,96,113],"uses":[78],"DHIES":[79,148],"to":[80,108],"fulfill":[81],"encryption,":[82],"thus":[83],"naturally":[84],"obtains":[85],"security":[87,101],"against":[88],"adaptive":[89],"chosen":[90,139,150],"ciphertext":[91,140,151],"attack":[92],"DHIES.":[94,105],"Second,":[95],"is":[97,124,136,149],"interoperable":[98],"existing":[100],"systems":[102],"Third,":[106],"compared":[107],"many":[109],"pairing-based":[110],"schemes,":[112],"only":[114],"requires":[115],"pairing":[116],"computation":[117],"during":[118],"generation":[121],"there":[123],"no":[125],"need":[126],"for":[127],"special":[128],"hash":[129],"function.":[130],"We":[131],"prove":[132],"that":[133],"our":[134,158],"selective":[137],"identity":[138],"secure":[141],"in":[142],"random":[144],"oracle":[145],"model":[146],"assuming":[147],"secure.":[152],"Additionally,":[153],"extract":[155],"algorithm":[156],"also":[160],"implies":[161],"an":[162],"identity-based":[163],"short":[164],"signature":[165],"scheme.":[166]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-03-02T08:37:19.008085","created_date":"2025-10-10T00:00:00"}
