-
1
-
-
33745606751
-
Relations among notions of security for identity based encryption schemes
-
N. Attrapadung, Y. Oui, G. Hanaoka, H. Imai, K. Matsuura, P. Yang, and R. Zhang. Relations among notions of security for identity based encryption schemes. Cryptology ePrint Archive, Report 2005/258, 2005. http://eprint.iacr. org/2005/258.
-
(2005)
Cryptology EPrint Archive, Report
, vol.2005
, Issue.258
-
-
Attrapadung, N.1
Oui, Y.2
Hanaoka, G.3
Imai, H.4
Matsuura, K.5
Yang, P.6
Zhang, R.7
-
2
-
-
24144432124
-
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
-
PKC 2005
-
J. Baek, R. Safavi-Naini, and W. Susilo. Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In PKC 2005, volume 3386 of LNCS, pages 380-397, 2005.
-
(2005)
LNCS
, vol.3386
, pp. 380-397
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
3
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
CRYPTO '98
-
M. Bellare, A. Desal, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. In CRYPTO '98, volume 1462 of LNCS, pages 26-45, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desal, A.2
Pointcheval, D.3
Rogaway, P.4
-
4
-
-
35048835319
-
Secure identity based encryption without random oracles
-
CRYPTO '04
-
D. Boneh and X. Boyen. Secure identity based encryption without random oracles. In CRYPTO '04, volume 3152 of LNCS, pages 443-459, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
5
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
EUROCRYPT '05
-
D. Boneh, X. Boyen, and E. Goh. Hierarchical identity based encryption with constant size ciphertext. In EUROCRYPT '05, volume 3494 of LNCS, pages 440-456, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.3
-
6
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
CRYPTO '01
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In CRYPTO '01, volume 2139 of LNCS, pages 213-229, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
85028450627
-
Non-malleable cryptography (extended abstract)
-
D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography (extended abstract). In STOC '91, pages 542-552, 1991.
-
(1991)
STOC '91
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
8
-
-
33745558696
-
Security notions for identity based encryption
-
D. Galindo and I. Hasuo, Security notions for identity based encryption, Cryptology ePrint Archive, Report 2005/253, 2005. http://eprint.iacr.org/2005/ 253.
-
(2005)
Cryptology EPrint Archive, Report
, vol.2005
, Issue.253
-
-
Galindo, D.1
Hasuo, I.2
-
10
-
-
29644441305
-
On chosen ciphertext security of multiple encryptions
-
O. Goldreich, Y. Lustig, and M. Naor. On chosen ciphertext security of multiple encryptions. Cryptology ePrint Archive, Report 2002/089, 2002. http://eprint.iacr.org/.
-
(2002)
Cryptology EPrint Archive, Report
, vol.2002
, Issue.89
-
-
Goldreich, O.1
Lustig, Y.2
Naor, M.3
-
12
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
CRYPTO '91
-
C. Rackoff and D.R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In CRYPTO '91, volume 576 of LNCS, pages 433-444, 1991.
-
(1991)
LNCS
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
13
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
CRYPTO '84
-
A. Shamir, Identity-based cryptosystems and signature schemes. In CRYPTO '84, volume 196 of LNCS, pages 47-53, 1985.
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
14
-
-
35248875140
-
Equivalence between semantic security and indistinguishability against chosen ciphertext attacks
-
PKC '03
-
Y. Watanabe, J. Shikata, and H. Imai. Equivalence between semantic security and indistinguishability against chosen ciphertext attacks. In PKC '03, volume 2567 of LNCS, pages 71-84, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 71-84
-
-
Watanabe, Y.1
Shikata, J.2
Imai, H.3
-
15
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
EUROCRYPT '05
-
B. Waters. Efficient identity-based encryption without random oracles. In EUROCRYPT '05, volume 3494 of LNCS, pages 114-127, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
|