-
2
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Advances in Cryptology-Crypto 2001, Springer-Verlag
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing, Advances in Cryptology-Crypto 2001, LNCS 2139, pp.213-229, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
84946840347
-
Short signatures from the Weil pairing
-
C. Boyd, editor, Advances in Cryptology-Asiacrypt 2001, Springer-Verlag
-
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the Weil pairing, In C. Boyd, editor, Advances in Cryptology-Asiacrypt 2001, LNCS 2248, pp.514-532, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
4
-
-
33846938928
-
An identity-based signature from gap Diffie-Hellman groups
-
J.C. Cha and J.H. Cheon. An identity-based signature from gap Diffie-Hellman groups, Cryptology ePrint Archive, Report 2002/018, available at http:// eprint.iacr.org/2002/018/.
-
Cryptology EPrint Archive, Report
, vol.2002
, Issue.18
-
-
Cha, J.C.1
Cheon, J.H.2
-
6
-
-
0026867210
-
Improved identity- Based key sharing system for multiaddress communcation
-
T. Chikazawa and A. Yamagishi. Improved identity- based key sharing system for multiaddress communcation, Electr. Lett., vol. 28, no.11, pp.1015-1017, 1992.
-
(1992)
Electr. Lett.
, vol.28
, Issue.11
, pp. 1015-1017
-
-
Chikazawa, T.1
Yamagishi, A.2
-
7
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Cryptography and Coding
-
C. Cocks. An identity based encryption scheme based on quadratic residues, In Cryptography and Coding, LNCS 2260, pp.360-363, 2001.
-
(2001)
LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
8
-
-
0027615034
-
ID-based cryptographic schemes for user identification, digital signature, and key distribution
-
L. Harn and S. Yang. ID-based cryptographic schemes for user identification, digital signature, and key distribution, IEEE J. on sele. areas in comm., vol.11, No.5 pp.757-760, 1993.
-
(1993)
IEEE J. on Sele. Areas in Comm.
, vol.11
, Issue.5
, pp. 757-760
-
-
Harn, L.1
Yang, S.2
-
9
-
-
1642407903
-
Efficient identity based signature schemes based on pairings
-
Proceedings of 9th workshop on selected areas in cryptography-SAC2002
-
F.Hess. Efficient identity based signature schemes based on pairings. Proceedings of 9th workshop on selected areas in cryptography-SAC2002. Lecture Notes in Computer Science.
-
Lecture Notes in Computer Science
-
-
Hess, F.1
-
10
-
-
0037974305
-
Exponent group signature schemes and efficient identity based signature schemes based on pairings
-
F. Hess. Exponent group signature schemes and efficient identity based signature schemes based on pairings, Cryptology ePrint Archive, Report 2002/012, available at http://eprint.iacr.org/2002/012/.
-
Cryptology EPrint Archive, Report
, vol.2002
, Issue.12
-
-
Hess, F.1
-
11
-
-
84947242701
-
Toward hierarchical identity-based encryption
-
Proc. Eurocrypt 2002, Springer-Verlag
-
J. Horwitz and B. Lynn. Toward hierarchical identity-based encryption, Proc. Eurocrypt 2002, LNCS 2332, pp.466-481, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
12
-
-
0028017207
-
Identity-based conference key broadcast systems
-
T. Hwang and J. L. Chen. Identity-based conference key broadcast systems, IEE Proc. Comput. Digit. Tech., vol.141, No.1 pp.57-60, 1994.
-
(1994)
IEE Proc. Comput. Digit. Tech.
, vol.141
, Issue.1
, pp. 57-60
-
-
Hwang, T.1
Chen, J.L.2
-
13
-
-
0020180459
-
A conference key distribution system
-
I. Ingemarsson, D.T. Tang, and C.K. Wong. A Conference Key Distribution System, IEEE Trans. Information Theory, vol.28, no. 5, pp. 714-720, 1982.
-
(1982)
IEEE Trans. Information Theory
, vol.28
, Issue.5
, pp. 714-720
-
-
Ingemarsson, I.1
Tang, D.T.2
Wong, C.K.3
-
14
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman
-
Proc. Fourth Algorithmic Number Theory Symposium, Springer-Verlag
-
A. Joux. A one round protocol for tripartite Diffie-Hellman, Proc. Fourth Algorithmic Number Theory Symposium, Lecture Notes in Computer Science, Vol. 1838, Springer-Verlag, pp. 385-394, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1838
, pp. 385-394
-
-
Joux, A.1
-
17
-
-
84937461306
-
One way hash functions and des
-
Advances in Cryptology-CRYPTO '89
-
R. Merkle. One way hash functions and DES, Advances in Cryptology-CRYPTO '89, Lecture Notes in Computer Science Vol. 435, pp.428-446, 1989.
-
(1989)
Lecture Notes in Computer Science
, vol.435
, pp. 428-446
-
-
Merkle, R.1
-
19
-
-
0024665726
-
Key distribution system based on identification information
-
E. Okamoto and K. Tanaka. Key distribution system based on identification information, IEEE Journal on Selected areas in comm., vol.7, No.4, 481-485, 1989.
-
(1989)
IEEE Journal on Selected Areas in Comm.
, vol.7
, Issue.4
, pp. 481-485
-
-
Okamoto, E.1
Tanaka, K.2
-
20
-
-
1642516007
-
ID-based signatures from pairings on elliptic curves
-
K.G. Paterson. ID-based signatures from pairings on elliptic curves, Cryptology ePrint Archive, Report 2002/004, available at http://eprint.iacr.org/ 2002/004/.
-
Cryptology EPrint Archive, Report
, vol.2002
, Issue.4
-
-
Paterson, K.G.1
-
21
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to Share a Secret, Communications of the ACM, vol. 22, no. 11, 612-613, 1979
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
22
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptology-Crypto 84, Springer-Verlag
-
A. Shamir. Identity-based cryptosystems and signature schemes, Advances in Cryptology-Crypto 84, LNCS 196, pp.47-53, Springer-Verlag, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
23
-
-
1842461904
-
A composition theorem for universal one-way hash functions
-
V. Shoup. A composition theorem for universal one-way hash functions,In Advances in Cryptology-Eurocrypt'2000, 2000.
-
(2000)
Advances in Cryptology-Eurocrypt'2000
-
-
Shoup, V.1
-
24
-
-
0037142442
-
An identity based authenticated key agreement protocol based on the Weil pairing
-
N.P. Smart. An identity based authenticated key agreement protocol based on the Weil pairing, Electron. Lett., Vol.38, No.13, pp.630-632, 2002.
-
(2002)
Electron. Lett.
, vol.38
, Issue.13
, pp. 630-632
-
-
Smart, N.P.1
-
25
-
-
85032215902
-
A realization scheme for the identity-based cryptosystem
-
proc. Crypto 87, Springer-Verlag
-
H. Tanaka. A realization scheme for the identity-based cryptosystem, proc. Crypto 87, LNCS 293 pp.341-349, Springer-Verlag, 1987.
-
(1987)
LNCS
, vol.293
, pp. 341-349
-
-
Tanaka, H.1
-
26
-
-
0024664858
-
An ID-based cryptosystem based on the discrete logarithm problem
-
S. Tsuji and T.Itoh. An ID-based cryptosystem based on the discrete logarithm problem, IEEE Journal of Selected Areas in Communications, Vol.7, No.4, pp.467-473, 1989.
-
(1989)
IEEE Journal of Selected Areas in Communications
, vol.7
, Issue.4
, pp. 467-473
-
-
Tsuji, S.1
Itoh, T.2
-
27
-
-
0036538428
-
A secure fault-tolerant conference-key agreement protocol
-
W.G. Tzeng. A Secure Fault-Tolerant Conference-Key Agreement Protocol, IEEE Trans. on Computers, Vol.51 No.4, pp.373-379, 2002.
-
(2002)
IEEE Trans. on Computers
, vol.51
, Issue.4
, pp. 373-379
-
-
Tzeng, W.G.1
-
28
-
-
0031098126
-
Conference key distribution system with user anonymity based on algebraic approach
-
TC. Wu. Conference key distribution system with user anonymity based on algebraic approach, IEE Proceedings Computers and Digital Techniques, Vol. 14, No. 2, pp. 145-148, 1997.
-
(1997)
IEE Proceedings Computers and Digital Techniques
, vol.14
, Issue.2
, pp. 145-148
-
-
Wu, T.C.1
-
30
-
-
63449088479
-
Efficient ID-based blind signature and proxy signature from bilinear pairings
-
ACISP 2003
-
F.Zhang and K.Kim. Efficient ID-based blind signature and proxy signature from bilinear pairings. ACISP 2003, LNCS 2727, pages 312-323, 2003.
-
(2003)
LNCS
, vol.2727
, pp. 312-323
-
-
Zhang, F.1
Kim, K.2
|