-
2
-
-
54249101916
-
Public key encryption with keyword search revisited
-
J. Baek, R. Naini, and W. Susilo. Public key encryption with keyword search revisited. Cryptology ePrint Archive, Report 2005/191, 2005. http://eprint.iacr.org/.
-
(2005)
Cryptology ePrint Archive, Report
, vol.2005
, Issue.191
-
-
Baek, J.1
Naini, R.2
Susilo, W.3
-
3
-
-
84946837370
-
Key-privacy in public-key cryptography
-
Advances in Cryptology - ASIACRYPT 2001, Springer-Verlag
-
M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval. Key-privacy in public-key cryptography. In Advances in Cryptology - ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, pages 566-582. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
4
-
-
17444370055
-
Public-key encryption with keyword search
-
C. Cachin, editor
-
D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano. Public-key encryption with keyword search, In C. Cachin, editor, Proceedings of Eurocrypt 2004, 2004. citeseer.ist.psu.edu/boneh04public.html.
-
(2004)
Proceedings of Eurocrypt 2004
-
-
Boneh, D.1
Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
5
-
-
0037623983
-
Identity based encryption from the Weil pairing
-
D. Boneh and M. Franklin. Identity based encryption from the Weil pairing. SIAM Journal on Computing, 32(3):586-615, 2003.
-
(2003)
SIAM Journal on Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
14844315859
-
Short signatures without random oracles
-
Dan Boneh and Xavier Boyen. Short signatures without random oracles. Cryptology ePrint Archive, Report 2004/171, 2004. http://eprint.iacr.org/.
-
(2004)
Cryptology ePrint Archive, Report
, vol.2004
, Issue.171
-
-
Boneh, D.1
Boyen, X.2
-
7
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Advances in Cryptology - CRYPTO '98, Springer-Verlag
-
R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In Advances in Cryptology - CRYPTO '98, volume 1462 of Lecture Notes in Computer Science, pages 13-25. Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
10
-
-
32244433334
-
K-resilient identity-based encryption in the standard model
-
Springer-Verlag
-
S. Heng and K. Kurosawa. K-resilient identity-based encryption in the standard model. In Topics in Cryptology CT-RSA 2004, volume 2964, pages 67-80. Springer-Verlag, 2004.
-
(2004)
Topics in Cryptology CT-RSA 2004
, vol.2964
, pp. 67-80
-
-
Heng, S.1
Kurosawa, K.2
-
11
-
-
23944469009
-
Public key encryption with conjunctive field keyword search
-
D. Park, K. Kim, and P. Lee. Public key encryption with conjunctive field keyword search. Lecture Notes in Computer Science, 3325:73-86, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3325
, pp. 73-86
-
-
Park, D.1
Kim, K.2
Lee, P.3
-
12
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptology - CRYPTO '84, Springer-Verlag
-
A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology - CRYPTO '84, volume 0193 of Lecture Notes in Computer Science, pages 47-53. Springer-Verlag, 1984.
-
(1984)
Lecture Notes in Computer Science
, vol.193
, pp. 47-53
-
-
Shamir, A.1
|