-
1
-
-
84937579774
-
DHIES: An encryption scheme based on the Diffie-Hellman problem
-
Lecture Notes in Computer Science, Springer-Verlag
-
M. Abdalla, M. Bellare and P. Rogaway. DHIES: An encryption scheme based on the Diffie-Hellman problem, Proceedings of CT-RSA 2001, Lecture Notes in Computer Science, Springer-Verlag, pages 143-158.
-
Proceedings of CT-RSA 2001
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
2
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracles
-
EUROCRYPT 2004
-
D. Boneh, X. Boyen. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles, EUROCRYPT 2004, LNCS, pp 223-238.
-
LNCS
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
4
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
EUROCRYPT 2005
-
D. Boneh, X. Boyen, E. Goh, Hierarchical Identity Based Encryption with Constant Size Ciphertext, EUROCRYPT 2005, Vol. 3494 of LNCS, pp 440-456.
-
LNCS
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.3
-
6
-
-
84874324906
-
Identity based encryption from the weil pairing
-
CRYPTO - 2001
-
D. Boneh, M. Franklin. Identity Based Encryption from the Weil Pairing. CRYPTO - 2001, volume 2139 of LNCS, pp. 213-229, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
0037623983
-
Identity based encryption from the weil pairing
-
D. Boneh, M. Franklin. Identity Based Encryption from the Weil Pairing. SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
24144453101
-
Improved efficiency for CCA-secure cryptosystems built using identity based encryption
-
Proceedings of RSA-CT '05
-
D. Boneh and J. Katz. Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption. In Proceedings of RSA-CT '05, LNCS 3376, pp. 87-103, 2005.
-
(2005)
LNCS
, vol.3376
, pp. 87-103
-
-
Boneh, D.1
Katz, J.2
-
9
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
CRYPTO 2002
-
P. S. L. M. Barreto, H. Y. Kim, B. Lynn and M. Scott. Efficient Algorithms for Pairing-Based Cryptosystems. CRYPTO 2002, LNCS 2442, pp. 354-368.
-
LNCS
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
10
-
-
27244440989
-
Pairing-friendly elliptic curves of prime order
-
Accepted for presentation at SAC 2005
-
P. S. L. M. Barreto and M. Naehrig. Pairing-Friendly Elliptic Curves of Prime Order. Cryptology ePrint Archive, Report 2005/133. Available from http://eprint.iacr.org/2005/133/. Accepted for presentation at SAC 2005.
-
Cryptology EPrint Archive, Report
, vol.2005
, Issue.133
-
-
Barreto, P.S.L.M.1
Naehrig, M.2
-
12
-
-
33745767987
-
Direct chosen ciphertext security from identity-based techniques
-
To appear. This version is available from Cryptology ePrint Archive, Report 2005/288
-
X. Boyen, Q. Mei and B. Waters. Direct Chosen Ciphertext Security from Identity-Based Techniques. In 12th ACM Conference on Computer and Communication Security - CCS 2005, To appear. This version is available from Cryptology ePrint Archive, Report 2005/288.
-
12th ACM Conference on Computer and Communication Security - CCS 2005
-
-
Boyen, X.1
Mei, Q.2
Waters, B.3
-
14
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
EUROCRYPT 2003
-
R. Canetti, S. Halevi and J. Katz. A Forward-Secure Public-Key Encryption Scheme. In EUROCRYPT 2003, Volume 2656 of LNCS, pp 255-271. 2003.
-
(2003)
LNCS
, vol.2656
, pp. 255-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
15
-
-
35048852705
-
Chosen-ciphertext security from identity based encryption
-
Proceedings of Eurocrypt 2004
-
R. Canetti, S. Halevi and J. Katz. Chosen-ciphertext Security from Identity Based Encryption. In Proceedings of Eurocrypt 2004- LNCS, 2004.
-
(2004)
LNCS
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
16
-
-
84911480395
-
The exact security of pairing based encryption and signature schemes
-
Talk, INRIA, Paris. November 3-5, Available from author's website
-
D. Galindo. The Exact Security of Pairing Based Encryption and Signature Schemes. Talk at Workshop on Provable Security, INRIA, Paris. November 3-5, 2004. Available from author's website.
-
(2004)
Workshop on Provable Security
-
-
Galindo, D.1
-
17
-
-
82955246861
-
Implementing the tate pairing
-
ANTS V
-
S. Galbraith, K. Harrison and D. Soldera. Implementing the Tate Pairing. ANTS V, LNCS 2369, pp. 324-337, 2002.
-
(2002)
LNCS
, vol.2369
, pp. 324-337
-
-
Galbraith, S.1
Harrison, K.2
Soldera, D.3
-
18
-
-
70349557354
-
Hierarchical ID-based cryptography
-
ASIACRYPT 2002
-
C. Gentry and A. Silverberg, Hierarchical ID-Based Cryptography, ASIACRYPT 2002, LNCS, 2002.
-
(2002)
LNCS
-
-
Gentry, C.1
Silverberg, A.2
-
19
-
-
84947242701
-
Towards hierarchical identity-based encryption
-
J. Horwitz and B. Lynn. Towards Hierarchical Identity-Based Encryption. In EUROCRYPT 2002, pp 466-481, 2002.
-
(2002)
EUROCRYPT 2002
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
20
-
-
11344280768
-
Another look at "provable security"
-
Cryptology ePrint Archive, Report 2004/152, final version (to appear in)
-
N. Koblitz and A. Menezes, Another look at "provable security", Cryptology ePrint Archive, Report 2004/152, http://eprint.iacr.org/2004/152/, final version (to appear in Journal of Cryptology).
-
Journal of Cryptology
-
-
Koblitz, N.1
Menezes, A.2
-
21
-
-
0000653210
-
Selecting cryptographic key sizes
-
A. K. Lenstra and E. R. Verheul, Selecting Cryptographic Key Sizes, Jr. Cryptology 14(4), pp. 255-293 (2001)
-
(2001)
Jr. Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
22
-
-
35048854690
-
HEAD: Hybrid encryption with delegated decryption capability
-
Proceedings of Indocrypt 2004
-
P. Sarkar, HEAD: Hybrid Encryption with Delegated Decryption Capability, Proceedings of Indocrypt 2004, LNCS, pp 230-244.
-
LNCS
, pp. 230-244
-
-
Sarkar, P.1
-
23
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
CRYPTO 84
-
A. Shamir. Identity-based Cryptosystems and Signature Schemes. CRYPTO 84, LNCS, pp 47-53, 1985.
-
(1985)
LNCS
, pp. 47-53
-
-
Shamir, A.1
-
24
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Eurocrypt 2005, Eurocrypt 2005
-
B. Waters. Efficient Identity-Based Encryption Without Random Oracles. Eurocrypt 2005, Eurocrypt 2005, Vol. 3494 of LNCS
-
LNCS
, vol.3494
-
-
Waters, B.1
-
25
-
-
84941148385
-
-
Also available from Cryptology ePrint Archive, Report 2004/180, http://eprint.iacr.org/2004/180/.
-
Cryptology EPrint Archive, Report
, vol.2004
, Issue.180
-
-
|