(redirected from Identity-based encryption)
Category filter:
IBEIdentity-Based Encryption
IBEIon Beam Etching
IBEIntegrated Business and Engineering (Lehigh University)
IBEInternational Bureau of Education
IBEInternet Booking Engine
IBEInternational Bureau for Epilepsy (est. 1961)
IBEInternational Beauty Expo (trade show)
IBEIntercultural Bilingual Education
IBEInstitute for the Built Environment (Colorado State University)
IBEIdentity Based Encryption
IBEInternational Business Enterprise
IBEInstitut für Medizinische Informationsverarbeitung, Biometrie Und Epidemiologie (LMU, Muenchen, Germany)
IBEInstitute of Biological Engineering
IBEInternational Business Enterprises
IBEInstitut Belge de l'Emballage (French: Belgian Packaging Institute)
IBEIberia, Lineas Aereas de Espana, Spain (ICAO code)
IBEID (Identity) Based Encryption (cryptography)
IBEInstitute for Behavioral Economics (Arizona)
IBEInstitute of Biomedical Engineering (UK)
IBEIsuzu Body Engineering (Japan)
IBEInboard Booster Engine
IBEInstitution-Based Exercise
IBEIndirect Battlefield Engagement System
IBEInfinity Bio-Energy Limited
IBEIntrahepatic Biliary Epithelium
IBEInternational Business Entity (Cyprus)
IBEImpaired Biliary Elimination
Copyright 1988-2018 AcronymFinder.com, All rights reserved.
References in periodicals archive ?
Waters, "Efficient Identity-Based Encryption Without Random Oracles," Lecture Notes in Computer Science, vol.
Catalano et al., "Wildcarded identity-based encryption," Journal of Cryptology, vol.
Cheng, "Security proof of Sakai-Kasahara's identity-based encryption scheme," in Proc.
Suzuki, "Anonymous hierarchical identity-based encryption with constant size ciphertexts," in PKC 2009.
Wu, "Compact anonymous hierarchical identity-based encryption with constant size private keys," Computer Journal, vol.
This section gives brief review of the various concepts of bilinear pairing, identity-based encryption and other related mathematical problems used in this paper.
Franklin, "Identity-Based Encryption from the Weil Pairing," in Advances in Cryptology -- CRYPTO 2001, vol.
In 2005 Brent Waters et al [6] conferred Efficient Identity-Based Encryption Without Random Oracles.
Fuzzy identity-based encryption [1] enables the application of public biometric identifiers for public key encryption without the hassle of certificates.
The construction of this scheme was inspired by identity-based encryption (IBE) and aims to allow a user to search for encrypted keywords without decryption.
TRI's technology provides a dramatic improvement over the logic of Identity-Based Encryption, because both the master public key and the unique private key are anonymously pre-bundled into the phone.