-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer-Verlag LNCS 196
-
A.Shamir, "Identity-based Cryptosystems and Signature Schemes", In Advances in Cryptology - CRYPTO'84, Springer-Verlag LNCS 196, 1985, pp. 47-53.
-
(1985)
Advances in Cryptology - CRYPTO'84
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
84947558992
-
A paradoxical identity-based signature scheme resulting from zero-knowledge
-
Springer, LNCS 403
-
L. Guillou, J. J. Quisquater, "A Paradoxical Identity-Based Signature Scheme Resulting From Zero-Knowledge", Advances in Cryptology - Crypto'88, Springer, LNCS 403, 1988, pp. 216-231.
-
(1988)
Advances in Cryptology - Crypto'88
, pp. 216-231
-
-
Guillou, L.1
Quisquater, J.J.2
-
4
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Springer, LNCS 263
-
A. Fiat, A. Shamir, "How to Prove Yourself: Practical Solutions to Identification and Signature Problems", Advances in Cryptology - Crypto'86, Springer, LNCS 263, 1986, pp. 186-194.
-
(1986)
Advances in Cryptology - Crypto'86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
5
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
J. Kilian, editor, Springer-Verlag, LNCS 2139
-
D. Boneh, M. Franklin. "Identity-based Encryption from the Weil pairing", In J. Kilian, editor, Advances in Cryptology-CRYPTO 2001, Springer-Verlag, LNCS 2139, 2001, pp. 213-229.
-
(2001)
Advances in Cryptology-CRYPTO 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
84944050090
-
Applications of multiple trust authorities in pairing based cryptosystems
-
LNCS 2437, Springer-Verlag
-
L. Chen, K. Harrison, N. P. Smart and D. Soldera, "Applications of Multiple Trust Authorities in pairing based Cryptosystems", InfraSec 2002, LNCS 2437, Springer-Verlag, 2002, pp. 260-275.
-
(2002)
InfraSec 2002
, pp. 260-275
-
-
Chen, L.1
Harrison, K.2
Smart, N.P.3
Soldera, D.4
-
7
-
-
1642414982
-
Cryptography from pairings: A snap shot of current research
-
K. Paterson, "Cryptography from Pairings: a snap shot of current research", Information Security Technical Report, Vol. 7(3), 2002, pp. 41-54.
-
(2002)
Information Security Technical Report
, vol.7
, Issue.3
, pp. 41-54
-
-
Paterson, K.1
-
8
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Springer- Verlag, LNCS 2595
-
F. Hess, "Efficient Identity Based Signature Schemes Based on Pairings", Selected Areas in Cryptography-SAC 2002, Springer- Verlag, LNCS 2595, 2003, pp. 310-324.
-
(2003)
Selected Areas in Cryptography-SAC 2002
, pp. 310-324
-
-
Hess, F.1
-
9
-
-
24744440154
-
Secure key issuing in ID-based cryptography
-
ACSW Frontiers 2004, ACS Conferences in Research and Practice in Information Technology 32
-
B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang, S. Yoo, "Secure Key Issuing in ID-based Cryptography", In proceedings of the Second Australian Information Security Workshop-AISW 2004, ACSW Frontiers 2004, ACS Conferences in Research and Practice in Information Technology 32, 2004, pp. 69-74.
-
(2004)
Proceedings of the Second Australian Information Security Workshop-AISW 2004
, pp. 69-74
-
-
Lee, B.1
Boyd, C.2
Dawson, E.3
Kim, K.4
Yang, J.5
Yoo, S.6
-
10
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
Springer- Verlag, LNCS 547
-
C. Gentry, "Certificate-Based Encryption and the Certificate Revocation Problem", Advances in Cryptology- Eurocrypt'03, Springer- Verlag, LNCS 547, 2003, pp. 272-293.
-
(2003)
Advances in Cryptology- Eurocrypt'03
, pp. 272-293
-
-
Gentry, C.1
-
11
-
-
0345490607
-
Certificateless public key cryptography
-
Springer-Verlag, LNCS 2894
-
S. Al-Riyami, K. Paterson, "Certificateless Public Key Cryptography", Advances in Cryptology - Asiacrypt'2003, Springer-Verlag, LNCS 2894, 2003, pp. 452-473.
-
(2003)
Advances in Cryptology - Asiacrypt'2003
, pp. 452-473
-
-
Al-Riyami, S.1
Paterson, K.2
-
12
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to Share a Secret", Comm. ACM, 1979, Volume 22(11), pp. 612-613.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
13
-
-
35048847949
-
What is possible with identity based cryptography for PKIs and what still must be improved
-
LNCS 3093
-
B. Libert, J. J. Quisquarter, "What Is Possible with Identity based Cryptography for PKIs and What Still Must be Improved", EuroPKI2004, LNCS 3093, 2004, pp. 57-70.
-
(2004)
EuroPKI2004
, pp. 57-70
-
-
Libert, B.1
Quisquarter, J.J.2
-
14
-
-
84937570422
-
Self-certified public keys
-
Advances in Cryptology - Eurocrypt'91, Springer-Verlag
-
M. Girault, "Self-certified public keys", Advances in Cryptology - Eurocrypt'91, Springer-Verlag, LNCS 2556, 1991, pp. 490-497.
-
(1991)
LNCS
, vol.2556
, pp. 490-497
-
-
Girault, M.1
-
15
-
-
84946840347
-
Short signatures from the Weil pairing
-
Springer-Verlag, LNCS 2248
-
D. Boneh, B. Lynn, H. Shacham, "Short signatures from the Weil pairing", Asiacrypt 2001, Springer-Verlag, LNCS 2248, 2002, pp. 514-532.
-
(2002)
Asiacrypt 2001
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
16
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Springer-Verlag, LNCS 2442
-
P. Barreto, H. Kim, B. Lynn, M. Scott, "Efficient algorithms for pairing-based Cryptosystems", Advances in Cryptology -Crypto'2002, Springer-Verlag, LNCS 2442, pp. 354-368.
-
Advances in Cryptology -Crypto'2002
, pp. 354-368
-
-
Barreto, P.1
Kim, H.2
Lynn, B.3
Scott, M.4
|