-
1
-
-
84956868427
-
A Quick Group Key Distribution Scheme with "Entity Revocation"
-
Advances in Cryptology - Asiacrypt '99
-
J. Anzai, N. Matsuzaki, and T. Matsumoto. A Quick Group Key Distribution Scheme with "Entity Revocation". Advances in Cryptology - Asiacrypt '99, Lecture Notes in Computer Science 1716, pages 333-347, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1716
, pp. 333-347
-
-
Anzai, J.1
Matsuzaki, N.2
Matsumoto, T.3
-
3
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advances in Cryptology, Crypto 2001, Springer Verlag
-
D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. In Advances in Cryptology, Crypto 2001, Lecture Notes in Computer Science 2139, pages 213-229. Springer Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
84946840347
-
Short signatures from the weil pairing
-
Advances in Cryptology, Asiacrypt 2001, Springer Verlag
-
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the weil pairing. In Advances in Cryptology, Asiacrypt 2001, Lecture Notes in Computer Science 2248, pages 514-532. Springer Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
5
-
-
84979291225
-
Broadcast encryption
-
Advances in Cryptology, Crypto '93, Springer Verlag
-
A. Fiat and M. Naor. Broadcast encryption. In Advances in Cryptology, Crypto '93, Lecture Notes in Computer Science 773, pages 480-491. Springer Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
6
-
-
70349557354
-
Hierarchical ID-based Cryptography
-
Advances in Cryptology, Asiacrypt 2002
-
C. Gentry and A. Silverberg. Hierarchical ID-based Cryptography. Advances in Cryptology, Asiacrypt 2002, Lecture Notes in Computer Science 2501, pages 548-566, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
7
-
-
84946844750
-
A One Round Protocol for Tripartite Diffie-Hellman
-
W. Bosma, editor, ANTS-IV, Springer Verlag
-
A. Joux. A One Round Protocol for Tripartite Diffie-Hellman. In W. Bosma, editor, ANTS-IV, Lecture Notes in Computer Science, pages 385-394. Springer Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, pp. 385-394
-
-
Joux, A.1
-
10
-
-
84944319284
-
Efficient Trace and Revoke Schemes
-
Financial Cryptography 2000
-
M. Naor and B. Pinkas. Efficient Trace and Revoke Schemes. Financial Cryptography 2000, Lecture Notes in Computer Science 1962, pages 1-20, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.1962
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
-
11
-
-
84946849368
-
Self-blindable credential certificates from the weil pairing
-
Advances in Cryptology-Asiacrypt 2001, Springer Verlag
-
E. R. Verheul. Self-blindable credential certificates from the weil pairing. In Advances in Cryptology-Asiacrypt 2001, Lecture Notes in Computer Science 2248, pages 533-551. Springer Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 533-551
-
-
Verheul, E.R.1
-
13
-
-
84958765355
-
ID-based Blind Signature and Ring Signature from Pairings
-
Advances in Cryptology, Asiacrypt 2002
-
F. Zhang and K. Kim. ID-based Blind Signature and Ring Signature from Pairings. Advances in Cryptology, Asiacrypt 2002, Lecture Notes in Computer Science 2501, pages 33-547, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 33-547
-
-
Zhang, F.1
Kim, K.2
|