메뉴 건너뛰기




Volumn 3650 LNCS, Issue , 2005, Pages 134-148

Certificateless public key encryption without pairing

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; DATA PRIVACY; DATA PROCESSING; MATHEMATICAL MODELS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 33645958856     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11556992_10     Document Type: Conference Paper
Times cited : (217)

References (17)
  • 1
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • A full version, A short version appeared at Asiacrypt 2003, Springer-Verlag
    • S. Al-Riyami and K. Paterson, Certificateless Public Key Cryptography, A full version, A short version appeared at Asiacrypt 2003, LNCS 2894, pp. 452-473, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2894 , pp. 452-473
    • Al-Riyami, S.1    Paterson, K.2
  • 2
    • 24144438230 scopus 로고    scopus 로고
    • CBE from CLPKE: A generic construction and efficient schemes
    • PKC '05, Springer-Verlag
    • S. Al-Riyami and K. Paterson, CBE from CLPKE: A Generic Construction and Efficient Schemes, In PKC '05, LNCS 3386, pp. 398-415, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3386 , pp. 398-415
    • Al-Riyami, S.1    Paterson, K.2
  • 4
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway, Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, In ACM CCCS '93, pp. 62-73, 1993.
    • (1993) ACM CCCS '93 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Crypto '01, Springer-Verlag
    • D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, In Crypto '01, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 6
    • 35048855095 scopus 로고    scopus 로고
    • Secret handshake from CA-oblivious encryption
    • Asiacrypt '04, Springer-Verlag
    • C. Castellucia, S. Jarecki and G. Tsudik, Secret Handshake from CA-Oblivious Encryption, In Asiacrypt '04, LNCS 3329, pp. 293-307, Springer-Verlag, 2004.
    • (2004) LNCS , vol.3329 , pp. 293-307
    • Castellucia, C.1    Jarecki, S.2    Tsudik, G.3
  • 7
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • IMA '01, Springer-Verlag
    • C. Cocks, An Identity Based Encryption Scheme Based on Quadratic Residues, In IMA '01, LNCS 2260, pp. 360-363, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 8
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetirc and symmetric encryption schemes
    • Crypto '99, Springer-Verlag
    • E. Fujisaki and T. Okamoto, Secure Integration of Asymmetirc and Symmetric Encryption Schemes, In Crypto '99, LNCS 1666, pp. 537-554, Springer-Verlag, 1999.
    • (1999) LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 9
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based encryption and the certificate revocation problem
    • Eurocrypt '03, Springer-Verlag
    • C. Gentry, Certificate-Based Encryption and the Certificate Revocation Problem, In Eurocrypt '03, LNCS 2656, pp. 272-293, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2656 , pp. 272-293
    • Gentry, C.1
  • 10
    • 84937570422 scopus 로고
    • Self certified public keys
    • Eurocrypt '91, Springer-Verlag
    • M. Girault, Self Certified Public Keys, In Eurocrypt '91, LNCS 547, pp. 490-497, Springer-Verlag, 1992.
    • (1992) LNCS , vol.547 , pp. 490-497
    • Girault, M.1
  • 12
    • 33645965713 scopus 로고    scopus 로고
    • MIRACL, Multiprecision Integer and Rational Arithmetic C/C++ Library, http://indigo.ie/ mscott/
  • 14
    • 84957867844 scopus 로고    scopus 로고
    • Identity-based and self-certified key-exchange protocols
    • ACISP '97, Springer-Verlag
    • S. Saeednia, Identity-Based and Self-Certified Key-Exchange Protocols, In ACISP '97, LNCS 1270, pp. 303-313, Springer-Verlag, 1997.
    • (1997) LNCS , vol.1270 , pp. 303-313
    • Saeednia, S.1
  • 15
    • 0000537828 scopus 로고
    • Efficient identifications and signatures for smart cards
    • Crypto '89, Springer-Verlag
    • C. P. Schnorr, Efficient Identifications and Signatures for Smart Cards, In Crypto '89, LNCS 435, pp. 239-251, Springer-Verlag, 1990.
    • (1990) LNCS , vol.435 , pp. 239-251
    • Schnorr, C.P.1
  • 16
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Crypto '84, Springer-Verlag
    • A. Shamir: Identity-based Cryptosystems and Signature Schemes, In Crypto '84, LNCS 196, pp. 47-53, Springer-Verlag, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 17
    • 33645584388 scopus 로고    scopus 로고
    • Generic construction of certificateless encryption
    • ICCSA '04, Springer-Verlag
    • D. Yum and P. Lee, Generic Construction of Certificateless Encryption, In ICCSA '04, LNCS 3043, pp. 802-811, Springer-Verlag, 2004.
    • (2004) LNCS , vol.3043 , pp. 802-811
    • Yum, D.1    Lee, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.