-
1
-
-
0345490607
-
Certificateless public key cryptography
-
A full version, A short version appeared at Asiacrypt 2003, Springer-Verlag
-
S. Al-Riyami and K. Paterson, Certificateless Public Key Cryptography, A full version, A short version appeared at Asiacrypt 2003, LNCS 2894, pp. 452-473, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.1
Paterson, K.2
-
2
-
-
24144438230
-
CBE from CLPKE: A generic construction and efficient schemes
-
PKC '05, Springer-Verlag
-
S. Al-Riyami and K. Paterson, CBE from CLPKE: A Generic Construction and Efficient Schemes, In PKC '05, LNCS 3386, pp. 398-415, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3386
, pp. 398-415
-
-
Al-Riyami, S.1
Paterson, K.2
-
3
-
-
0038487086
-
Secret handshakes from pairing-based key agreements
-
IEEE Press
-
D. Balfanz, G. Durfee, N. Shankar, D. K. Smetters, J. Staddon, and H.C. Wong, Secret Handshakes from Pairing-Based Key Agreements, In IEEE Symposium on Security and Privacy '03, pp. 180-196, IEEE Press, 2003.
-
(2003)
IEEE Symposium on Security and Privacy '03
, pp. 180-196
-
-
Balfanz, D.1
Durfee, G.2
Shankar, N.3
Smetters, D.K.4
Staddon, J.5
Wong, H.C.6
-
4
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway, Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, In ACM CCCS '93, pp. 62-73, 1993.
-
(1993)
ACM CCCS '93
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Crypto '01, Springer-Verlag
-
D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, In Crypto '01, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
35048855095
-
Secret handshake from CA-oblivious encryption
-
Asiacrypt '04, Springer-Verlag
-
C. Castellucia, S. Jarecki and G. Tsudik, Secret Handshake from CA-Oblivious Encryption, In Asiacrypt '04, LNCS 3329, pp. 293-307, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3329
, pp. 293-307
-
-
Castellucia, C.1
Jarecki, S.2
Tsudik, G.3
-
7
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
IMA '01, Springer-Verlag
-
C. Cocks, An Identity Based Encryption Scheme Based on Quadratic Residues, In IMA '01, LNCS 2260, pp. 360-363, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
8
-
-
84955339164
-
Secure integration of asymmetirc and symmetric encryption schemes
-
Crypto '99, Springer-Verlag
-
E. Fujisaki and T. Okamoto, Secure Integration of Asymmetirc and Symmetric Encryption Schemes, In Crypto '99, LNCS 1666, pp. 537-554, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
9
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
Eurocrypt '03, Springer-Verlag
-
C. Gentry, Certificate-Based Encryption and the Certificate Revocation Problem, In Eurocrypt '03, LNCS 2656, pp. 272-293, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 272-293
-
-
Gentry, C.1
-
10
-
-
84937570422
-
Self certified public keys
-
Eurocrypt '91, Springer-Verlag
-
M. Girault, Self Certified Public Keys, In Eurocrypt '91, LNCS 547, pp. 490-497, Springer-Verlag, 1992.
-
(1992)
LNCS
, vol.547
, pp. 490-497
-
-
Girault, M.1
-
11
-
-
1642394295
-
Hidden credentials
-
ACM Press
-
J. Holt, R. Bradshaw, K. E. Seamons and H. Orman, Hidden Credentials, In ACM Workshop on Privacy in the Electronic Society (WPES) '03, pp. 1-8, ACM Press, 2003.
-
(2003)
ACM Workshop on Privacy in the Electronic Society (WPES) '03
, pp. 1-8
-
-
Holt, J.1
Bradshaw, R.2
Seamons, K.E.3
Orman, H.4
-
12
-
-
33645965713
-
-
MIRACL, Multiprecision Integer and Rational Arithmetic C/C++ Library, http://indigo.ie/ mscott/
-
-
-
-
14
-
-
84957867844
-
Identity-based and self-certified key-exchange protocols
-
ACISP '97, Springer-Verlag
-
S. Saeednia, Identity-Based and Self-Certified Key-Exchange Protocols, In ACISP '97, LNCS 1270, pp. 303-313, Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1270
, pp. 303-313
-
-
Saeednia, S.1
-
15
-
-
0000537828
-
Efficient identifications and signatures for smart cards
-
Crypto '89, Springer-Verlag
-
C. P. Schnorr, Efficient Identifications and Signatures for Smart Cards, In Crypto '89, LNCS 435, pp. 239-251, Springer-Verlag, 1990.
-
(1990)
LNCS
, vol.435
, pp. 239-251
-
-
Schnorr, C.P.1
-
16
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Crypto '84, Springer-Verlag
-
A. Shamir: Identity-based Cryptosystems and Signature Schemes, In Crypto '84, LNCS 196, pp. 47-53, Springer-Verlag, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
17
-
-
33645584388
-
Generic construction of certificateless encryption
-
ICCSA '04, Springer-Verlag
-
D. Yum and P. Lee, Generic Construction of Certificateless Encryption, In ICCSA '04, LNCS 3043, pp. 802-811, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3043
, pp. 802-811
-
-
Yum, D.1
Lee, P.2
|