-
1
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
Advances in Cryptology-Crypto 84
-
A. Shamir. Identity based cryptosystems and signature schemes. Advances in Cryptology-Crypto 84, LNCS, 196:47-53, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advances in Cryptology - Crypto 2001
-
D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. Advances in Cryptology - Crypto 2001, LNCS, 2193:213-229, 2001.
-
(2001)
LNCS
, vol.2193
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
35048841300
-
Efficient selective-id secure identity based encryption without random oracles
-
Advances in Cryptology-Eurocryjpt 04
-
D. Boneh and X. Boyen. Efficient selective-id secure identity based encryption without random oracles. Advances in Cryptology-Eurocryjpt 04, LNCS, 3027:223-238, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
4
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Cryptography and coding
-
C. Cocks. An identity based encryption scheme based on quadratic residues. Cryptography and coding, LNCS, 2260:360-363, 2001.
-
(2001)
LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
5
-
-
0035416443
-
A threshold key escrow scheme based on public key cryptosystem
-
August
-
Z. Cao. A threshold key escrow scheme based on public key cryptosystem. Science in China(series E), 44(4):441-448, August 2001.
-
(2001)
Science in China(series E)
, vol.44
, Issue.4
, pp. 441-448
-
-
Cao, Z.1
-
6
-
-
0141719369
-
Two classes of robust threshold key escrow schemes
-
(in chinese). June
-
Z. Cao. Two classes of robust threshold key escrow schemes(in chinese). Journal of Software, 14(06):1164-1171, June 2003.
-
(2003)
Journal of Software
, vol.14
, Issue.6
, pp. 1164-1171
-
-
Cao, Z.1
-
8
-
-
70349557354
-
Hierarchical id-based cryptography
-
Proceedings of Asiacrypt 2002
-
C. Gentry and A. Silverberg. Hierarchical id-based cryptography. Proceedings of Asiacrypt 2002, LNCS, 2501:548-566, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
10
-
-
84957629783
-
Relations among notations of security for public key encryption schemes
-
Advances in Cryptology-Proceedings of Crypto 98
-
D. M. Bellare, A. Desai and P. Rogaway. Relations among notations of security for public key encryption schemes. Advances in Cryptology-Proceedings of Crypto 98, LNCS, 1462:26-45, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, D.M.1
Desai, A.2
Rogaway, P.3
-
11
-
-
84888872516
-
Securing threshold cryptosystems against chosen ciphertext attack
-
Advances in Cryptology-Eurocrypt'98
-
V. Shoup and R. Gennaro. Securing threshold cryptosystems against chosen ciphertext attack. Advances in Cryptology-Eurocrypt'98, LNCS, 1403:1-16, 1998.
-
(1998)
LNCS
, vol.1403
, pp. 1-16
-
-
Shoup, V.1
Gennaro, R.2
|