-
1
-
-
24144432124
-
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
-
PKC 2005
-
J. Baek, R. Safavi-Naini and W. Susilo. Efficient Multi-Receiver Identity-Based Encryption and Its Application to Broadcast Encryption. PKC 2005, LNCS 3386, pp 380-397, 2005.
-
(2005)
LNCS
, vol.3386
, pp. 380-397
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
2
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
CRYPTO 2002
-
P. S. L. M. Barreto, H. Y. Kim, B. Lynn and M. Scott. Efficient Algorithms for Pairing-Based Cryptosystems. CRYPTO 2002, LNCS 2442, pp. 354-368, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
4
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracles
-
EUROCRYPT 2004
-
D. Boneh, X. Boyen. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles, EUROCRYPT 2004, LNCS 3027, pp 223-238, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
5
-
-
35048835319
-
Secure identity based encryption without random oracles
-
CRYPTO 2004
-
D. Boneh, X. Boyen. Secure Identity Based Encryption without Random Oracles. CRYPTO 2004, LNCS 3152, pp 443-459, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
6
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
EUROCRYPT 2005
-
D. Boneh, X. Boyen, E. Goh, Hierarchical Identity Based Encryption with Constant Size Ciphertext, EUROCRYPT 2005, LNCS 3494, pp 440-456, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.3
-
8
-
-
84874324906
-
Identity based encryption from the weil pairing
-
CRYPTO 2001
-
D. Boneh, M. Franklin. Identity Based Encryption from the Weil Pairing. CRYPTO 2001. LNCS 2139, pp. 213-229, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
0037623983
-
Identity based encryption from the weil pairing
-
D. Boneh, M. Franklin. Identity Based Encryption from the Weil Pairing. SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
10
-
-
24144453101
-
Improved efficiency for CCA-secure cryptosystems built using identity based encryption
-
RSA-CT 2005
-
D. Boneh and J. Katz. Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption. RSA-CT 2005, LNCS 3376, pp. 87-103, 2005.
-
(2005)
LNCS
, vol.3376
, pp. 87-103
-
-
Boneh, D.1
Katz, J.2
-
11
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
EUROCRYPT 2003
-
R. Canetti, S. Halevi and J. Katz. A Forward-Secure Public-Key Encryption Scheme. EUROCRYPT 2003, LNCS 2656, pp 255-271. 2003.
-
(2003)
LNCS
, vol.2656
, pp. 255-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
12
-
-
35048852705
-
Chosen-ciphertext security from identity based encryption
-
EUROCRYPT 2004
-
R. Canetti, S. Halevi and J. Katz. Chosen-ciphertext Security from Identity Based Encryption. EUROCRYPT 2004. LNCS 3027, pp 207-222, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
13
-
-
82955246861
-
Implementing the tate pairing
-
ANTS V
-
S. Galbraith, K. Harrison and D. Soldera. Implementing the Tate Pairing. ANTS V, LNCS 2369, pp. 324-337, 2002.
-
(2002)
LNCS
, vol.2369
, pp. 324-337
-
-
Galbraith, S.1
Harrison, K.2
Soldera, D.3
-
14
-
-
70349557354
-
Hierarchical ID-based cryptography
-
ASIACRYPT 2002
-
C. Gentry and A. Silverberg, Hierarchical ID-Based Cryptography, ASIACRYPT 2002. LNCS 2501, pp 548-566, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
15
-
-
84947242701
-
Towards hierarchical identity-based encryption
-
EUROCRYPT 2002
-
J. Horwitz and B. Lynn. Towards Hierarchical Identity-Based Encryption. EUROCRYPT 2002, LNCS 2332, pp 466-481, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
16
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
CRYPTO 1984
-
A. Shamir. Identity-based Cryptosystems and Signature Schemes. CRYPTO 1984, LNCS 196, pp 47-53, 1985.
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
17
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
EUROCRYPT 2005
-
B. Waters. Efficient Identity-Based Encryption without Random Oracles. EUROCRYPT 2005, LNCS 3494, pp 114-127, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
18
-
-
84941157811
-
-
Also available from Cryptology ePrint Archive, Report 2004/180, http://eprint.iacr.org/2004/180/
-
Cryptology ePrint Archive, Report
, vol.2004
, Issue.180
-
-
|