-
2
-
-
0345490607
-
Certificateless public key cryptography
-
Asiacrypt'03, Springer
-
S. S. Al-Riyami and K. Paterson. Certificateless public key cryptography. In Asiacrypt'03, volume 2894 of LNCS, pages 452-473. Springer, 2003.
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.2
-
3
-
-
24144438230
-
CBE from CL-PKE: A generic construction and efficient schemes
-
PKC'05, Springer
-
S. S. Al-Riyami and K. Paterson. CBE from CL-PKE: A generic construction and efficient schemes. In PKC'05, volume 3386 of LNCS, pages 398-415. Springer, 2005.
-
(2005)
LNCS
, vol.3386
, pp. 398-415
-
-
Al-Riyami, S.S.1
Paterson, K.2
-
4
-
-
33645958856
-
Certificateless public key encryption without pairing
-
ISC'05, Springer
-
J. Baek, R. Safavi-Naini, and W. Susilo. Certificateless public key encryption without pairing. In ISC'05, volume 3650 of LNCS, pages 134-148. Springer, 2005.
-
(2005)
LNCS
, vol.3650
, pp. 134-148
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
5
-
-
35048900981
-
On the selection of pairing-friendly groups
-
SAC'03, Springer
-
P. S. L. M. Barreto, B. Lynn, and M. Scott. On the selection of pairing-friendly groups. In SAC'03, volume 3006 of LNCS, pages 17-25. Springer, 2003.
-
(2003)
LNCS
, vol.3006
, pp. 17-25
-
-
Barreto, P.S.L.M.1
Lynn, B.2
Scott, M.3
-
6
-
-
27244440989
-
Pairing-friendly elliptic curves of prime order
-
To Appear
-
P. S. L. M. Barreto and M. Naehrig. Pairing-friendly elliptic curves of prime order. In SAC'05. To Appear.
-
SAC'05
-
-
Barreto, P.S.L.M.1
Naehrig, M.2
-
7
-
-
35048849890
-
Compressed pairings
-
Crypto'04, Springer
-
P. S. L. M. Barreto and M. Scott. Compressed pairings. In Crypto'04, volume 3152 of LNCS, pages 140-156. Springer, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 140-156
-
-
Barreto, P.S.L.M.1
Scott, M.2
-
9
-
-
33645751082
-
Generic construction of identity-based and certificateless KEMs
-
K. Bentahar, P. Farshim, J. Malone-Lee, and N. P. Smart. Generic construction of identity-based and certificateless KEMs. Cryptology ePrint Archive, Report 2005/058, 2005. http://eprint.iacr.org/2005/058.
-
(2005)
Cryptology EPrint Archive, Report
, vol.2005
, Issue.58
-
-
Bentahar, K.1
Farshim, P.2
Malone-Lee, J.3
Smart, N.P.4
-
10
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracles
-
Eurocrypt'04, Springer
-
D. Boneh and X. Boyen. Efficient selective-ID secure identity based encryption without random oracles. In Eurocrypt'04, volume 3027 of LNCS, pages 223-238. Springer, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
11
-
-
35048848152
-
Short signatures without random oracles
-
Eurocrypt'04, Springer
-
D. Boneh and X. Boyen. Short signatures without random oracles. In Eurocrypt'04, volume 3027 of LNCS, pages 56-73. Springer, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
12
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Crypto'01, Springer
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Crypto'01, volume 2139 of LNCS, pages 213-229. Springer, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
13
-
-
35248897599
-
A forward secure public key encryption scheme
-
Eurocrypt'03, Springer
-
R. Canetti, S. Halevi, and J. Katz. A forward secure public key encryption scheme. In Eurocrypt'03, volume 2656 of LNCS, pages 254-271. Springer, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 254-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
14
-
-
33645751214
-
Security proof of Sakai-Kasahara's identity-based encryption scheme
-
IMA Int. Conf. 2005, Springer
-
L. Chen and Z. Cheng. Security proof of Sakai-Kasahara's identity-based encryption scheme. In IMA Int. Conf. 2005, volume 3796 of LNCS, pages 442-459. Springer, 2005. Also available from http://eprint.iacr.org/2005/226.
-
(2005)
LNCS
, vol.3796
, pp. 442-459
-
-
Chen, L.1
Cheng, Z.2
-
15
-
-
38049109544
-
An efficient ID-KEM based on the Sakai-Kasahara key construction
-
L. Chen, Z. Cheng, J. Malone-Lee, and N. P. Smart. An efficient ID-KEM based on the Sakai-Kasahara key construction. Cryptology ePrint Archive, Report 2005/224, 2005. http://eprint.iacr.org/2005/224.
-
(2005)
Cryptology EPrint Archive, Report
, vol.2005
, Issue.224
-
-
Chen, L.1
Cheng, Z.2
Malone-Lee, J.3
Smart, N.P.4
-
16
-
-
33744808601
-
Efficient certificateless public key encryption
-
Z. Cheng and R. Comley. Efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/012, 2005. http://eprint.iacr.org/2005/012.
-
(2005)
Cryptology EPrint Archive, Report
, vol.2005
, Issue.12
-
-
Cheng, Z.1
Comley, R.2
-
17
-
-
84941147192
-
On proofs of security for certificateless cryptosystems
-
A. Dent and C. Kudla. On Proofs of Security for Certificateless Cryptosystems. Cryptology ePrint Archive, Report 2005/348, 2005. http://eprint.iacr.org/2005/348.
-
(2005)
Cryptology EPrint Archive, Report
, vol.2005
, Issue.348
-
-
Dent, A.1
Kudla, C.2
-
18
-
-
24144468589
-
Chosen-ciphertext security of multiple encryption
-
TCC'05, Springer
-
Y. Dodis and J. Katz. Chosen-ciphertext security of multiple encryption. In TCC'05, volume 3378 of LNCS, pages 188-209. Springer, 2005.
-
(2005)
LNCS
, vol.3378
, pp. 188-209
-
-
Dodis, Y.1
Katz, J.2
-
19
-
-
84956859011
-
How to enhance the security of public-key encryption at minimum cost
-
PKC'99, Springer
-
E. Fujisaki and T. Okamoto. How to enhance the security of public-key encryption at minimum cost. In PKC'99, volume 1560 of LNCS, pages 53-68. Springer, 1999.
-
(1999)
LNCS
, vol.1560
, pp. 53-68
-
-
Fujisaki, E.1
Okamoto, T.2
-
20
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Crypto'99, Springer
-
E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In Crypto'99, volume 1666 of LNCS, pages 537-554. Springer, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
21
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Crypto'84, Springer
-
T. E. Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In Crypto'84, volume 196 of LNCS, pages 10-18. Springer, 1985.
-
(1985)
LNCS
, vol.196
, pp. 10-18
-
-
Gamal, T.E.1
-
22
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
Euror-ypt'03, Springer
-
C. Gentry. Certificate-based encryption and the certificate revocation problem. In Euror-ypt'03, volume 2656 of LNCS, pages 272-293. Springer, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 272-293
-
-
Gentry, C.1
-
23
-
-
84937570422
-
Self-certified public keys
-
Eurocrypt'91, Springer
-
M. Girault. Self-certified public keys. In Eurocrypt'91, volume 547 of LNCS, pages 490-497. Springer, 1991.
-
(1991)
LNCS
, vol.547
, pp. 490-497
-
-
Girault, M.1
-
24
-
-
33645598062
-
A certificate-based signature scheme
-
CTRSA'04, Springer
-
G. Kang and S. H. H. J. H. Park. A certificate-based signature scheme. In CTRSA'04, volume 2964 of LNCS, pages 99-111. Springer, 2004.
-
(2004)
LNCS
, vol.2964
, pp. 99-111
-
-
Kang, G.1
Park, S.H.H.J.H.2
-
25
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
A. Miyaji, M. Nakabayashi, and S. Takano. New explicit conditions of elliptic curve traces for FR-reduction. IEICE Transactions on Fundamentals, E84-A(5):1234-1243, 2001.
-
(2001)
IEICE Transactions on Fundamentals
, vol.E84-A
, Issue.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
26
-
-
33645608384
-
ID-based cryptosystems with pairing on elliptic curve
-
Hamamatsu, Japan
-
R. Sakai and M. Kasahara. ID-based cryptosystems with pairing on elliptic curve. In SCIS'03, Hamamatsu, Japan, 2003. http://eprint.iacr.org/2003/054.
-
(2003)
SCIS'03
-
-
Sakai, R.1
Kasahara, M.2
-
27
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
Crypto'84, Springer
-
A. Shamir. Identity based cryptosystems and signature schemes. In Crypto'84, volume 196 of LNCS, pages 47-53. Springer, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
28
-
-
33646817646
-
On computable isomorphisms in efficient pairing based systems
-
N. P. Smart and F. Vercauteren. On computable isomorphisms in efficient pairing based systems. Cryptology ePrint Archive, Report 2005/116, 2005. http://eprint.iacr.org/2005/116.
-
(2005)
Cryptology EPrint Archive, Report
, vol.2005
, Issue.116
-
-
Smart, N.P.1
Vercauteren, F.2
-
29
-
-
33645584388
-
Generic construction of certificateless encryption
-
ICCSA'04, Springer
-
D. H. Yum and P. J. Lee. Generic construction of certificateless encryption. In ICCSA'04, volume 3043 of LNCS, pages 802-811. Springer, 2004.
-
(2004)
LNCS
, vol.3043
, pp. 802-811
-
-
Yum, D.H.1
Lee, P.J.2
-
30
-
-
35048832495
-
Generic construction of certificateless signature
-
ACISP'04, Springer
-
D. H. Yum and P. J. Lee. Generic construction of certificateless signature. In ACISP'04, volume 3108 of LNCS, pages 200-211. Springer, 2004.
-
(2004)
LNCS
, vol.3108
, pp. 200-211
-
-
Yum, D.H.1
Lee, P.J.2
-
31
-
-
33645601534
-
Identity-based cryptography in public key management
-
EuroPKI'04, Springer
-
D. H. Yum and P. J. Lee. Identity-based cryptography in public key management. In EuroPKI'04, volume 3093 of LNCS, pages 71-84. Springer, 2004.
-
(2004)
LNCS
, vol.3093
, pp. 71-84
-
-
Yum, D.H.1
Lee, P.J.2
-
32
-
-
33745822106
-
On the security of multiple encryption or CCA-security+CCA-security=CCA-security?
-
PKC'04, Springer
-
R. Zhang, G. Hanaoka, J. Shikata and H. Imai. On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? In PKC'04, volume 2947 of LNCS, pages 360-374. Springer, 2004.
-
(2004)
LNCS
, vol.2947
, pp. 360-374
-
-
Zhang, R.1
Hanaoka, G.2
Shikata, J.3
Imai, H.4
-
33
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its applications
-
PKC'04, Springer
-
F. Zhang, R. Safavi-Naini, and W. Susilo. An efficient signature scheme from bilinear pairings and its applications. In PKC'04, volume 2947 of LNCS, pages 277-290. Springer, 2004.
-
(2004)
LNCS
, vol.2947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
|