Abstract
The authors describe an identity based key encapsulation mechanism (ID-KEM). It is possible to use this ID-KEM to build a secure identity based encryption scheme using the techniques of Bentahar et al. The resulting encryption scheme has a number of performance advantages over existing methods.
Translated title of the contribution | Efficient ID-KEM based on the Sakai-Kasahara key construction |
---|---|
Original language | English |
Pages (from-to) | 19 - 26 |
Number of pages | 8 |
Journal | IEE Proceedings: Information Security |
Volume | 153 (1) |
DOIs | |
Publication status | Published - Mar 2006 |