-
1
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
Advances in Cryptology - Crypto 2005 Springer-Verlag
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In Advances in Cryptology - Crypto 2005, volume 3621 of LNCS, pages 205-222. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
57849085492
-
Efficient identity based encryption with tight security reduction
-
N. Attrapadung, B. Chevallier-Mames, J. Furukawa, T. Gomi, G. Hanaoka, H. Imai, and R. Zhang. Efficient Identity Based Encryption with Tight Security Reduction. Cryptology ePrint Archive 2005/320.
-
Cryptology EPrint Archive
, vol.2005
, Issue.320
-
-
Attrapadung, N.1
Chevallier-Mames, B.2
Furukawa, J.3
Gomi, T.4
Hanaoka, G.5
Imai, H.6
Zhang, R.7
-
3
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In Proc. of ACM CCS, pages 62-73, 1993.
-
(1993)
Proc. of ACM CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
35048841300
-
Efficient selective-ID identity based encryption without random oracles
-
Advances in Cryptology - Eurocrypt 2004, Springer-Verlag
-
D. Boneh and X. Boyen. Efficient Selective-ID Identity Based Encryption without Random Oracles. In Advances in Cryptology - Eurocrypt 2004, volume 3027 of LNCS, pages 223-238. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
5
-
-
35048835319
-
Secure identity based encryption without random oracles
-
Advances in Cryptology - Crypto 2004, Springer-Verlag
-
D. Boneh and X. Boyen. Secure Identity Based Encryption without Random Oracles. In Advances in Cryptology - Crypto 2004, volume 3152 of LNCS, pages 443-459. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
6
-
-
24944562007
-
Hierarchical identity based Encryption with constant size ciphertext
-
Advances in Cryptology - Eurocrypt 2005, Springer-Verlag
-
D. Boneh, X. Boyen, and E.-J. Goh. Hierarchical Identity Based Encryption with Constant Size Ciphertext. In Advances in Cryptology - Eurocrypt 2005, volume 3494 of LNCS, pages 440-456. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
7
-
-
35048901123
-
Public key encryption with keyword search
-
Advances in Cryptology - Eurocrypt Springer-Verlag 2004
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano. Public Key Encryption with Keyword Search. In Advances in Cryptology - Eurocrypt 2004, volume 3027 of LNCS, pages 506-522. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
8
-
-
84874324906
-
Identity based encryption from the weil pairing
-
Advances in Cryptology - Crypto Springer-Verlag. 2001
-
D. Boneh and M. Franklin. Identity Based Encryption from the Weil pairing. In Advances in Cryptology - Crypto 2001, volume 2139 of LNCS, pages 213-229. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
0037623983
-
Identity based encryption from the weil pairing
-
D. Boneh and M. Franklin. Identity Based Encryption from the Weil pairing. SIAM Journal of Computing, 32(3):586-615, 2003.
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
10
-
-
33745166648
-
Collusion-resistant broadcast encryption with short ciphertexts and private keys
-
Advances in Cryptology - Crypto 2005, Springer-Verlag
-
D. Boneh, C. Gentry, and B. Waters. Collusion-Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In Advances in Cryptology - Crypto 2005, volume 3621 of LNCS, pages 258-275. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
11
-
-
24144453101
-
Improved efficiency for CCA-secure cryptosystems built using identity based encryption
-
Proc. of CT-RSA, Springer-Verlag
-
D. Boneh and J. Katz. Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption. In Proc. of CT-RSA, volume 3376 of LNCS, pages 87-103. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3376
, pp. 87-103
-
-
Boneh, D.1
Katz, J.2
-
12
-
-
84946840347
-
-
Advances in Cryptology - Asiacrypt 2001, Lecture Notes in Computer Science 2248 Springer
-
D. Boneh, B. Lynn, and H. Shacham, Short signatures from the Weil pairing, Advances in Cryptology - Asiacrypt 2001, Lecture Notes in Computer Science 2248 (2001), Springer, 514-532.
-
(2001)
Short Signatures from the Weil Pairing
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
13
-
-
33745767987
-
Direct chosen ciphertext security from identity based techniques
-
X. Boyen, Q. Mie and B. Waters, Direct Chosen Ciphertext Security from Identity Based Techniques, In Proc. of ACM CCS, pages 320-329, 2005.
-
(2005)
Proc. of ACM CCS
, pp. 320-329
-
-
Boyen, X.1
Mie, Q.2
Waters, B.3
-
15
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
Advances in Cryptology - Eurocrypt 2003, Springer-Verlag
-
R. Canetti, S. Halevi, and J. Katz. A Forward-Secure Public-Key Encryption Scheme. In Advances in Cryptology - Eurocrypt 2003, volume 2656 of LNCS, pages 255-271. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 255-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
16
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Advances in Cryptology - Eurocrypt 2004, Springer-Verlag
-
R. Canetti, S. Halevi, and J. Katz. Chosen-Ciphertext Security from Identity-Based Encryption. In Advances in Cryptology - Eurocrypt 2004, volume 3027 of LNCS, pages 207-222. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
17
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attacks
-
Advances in Cryptology - Crypto 1998, Springer-Verlag
-
R. Cramer and V. Shoup. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attacks. In Advances in Cryptology - Crypto 1998, volume 1462 of LNCS, pages 13-25. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
18
-
-
84890013435
-
Signature schemes based on the strong RSA assumption
-
R. Cramer and V. Shoup. Signature Schemes Based on the Strong RSA Assumption. In Proc. of ACM CCS, pages 46-51, 1999.
-
(1999)
Proc. of ACM CCS
, pp. 46-51
-
-
Cramer, R.1
Shoup, V.2
-
19
-
-
84958742006
-
Efficient construction of (Distributed) verifiable random functions
-
Proc. of Public Key Cryptography, Springer-Verlag
-
Y. Dodis. Efficient Construction of (Distributed) Verifiable Random Functions. In Proc. of Public Key Cryptography, volume 2567 of LNCS, pages 1-17. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2567
, pp. 1-17
-
-
Dodis, Y.1
-
20
-
-
24144481228
-
A verifiable random function with short proofs and keys
-
Proc. of Public Key Cryptography, Springer-Verlag
-
Y. Dodis and A. Yampolskiy. A Verifiable Random Function with Short Proofs and Keys. In Proc. of Public Key Cryptography, volume 3386 of LNCS, pages 416-431. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3386
, pp. 416-431
-
-
Dodis, Y.1
Yampolskiy, A.2
-
21
-
-
70349557354
-
Hierarchical ID-based cryptography
-
Advances in Cryptology - Asiacrypt 2002, Springer-Verlag
-
C. Gentry and A. Silverberg. Hierarchical ID-Based Cryptography. In Advances in Cryptology - Asiacrypt 2002, volume 2501 of LNCS, pages 548-566. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
22
-
-
84947242701
-
Toward hierarchical identity-based encryption
-
Advances in Cryptology - Eurocrypt 2002, Springer-Verlag
-
J. Horwitz and B. Lynn. Toward Hierarchical Identity-Based Encryption. In Advances in Cryptology - Eurocrypt 2002, volume 2332 of LNCS, pages 466-481. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
23
-
-
18744364723
-
Efficiency improvements for signature schemes with tight security reductions
-
J. Katz and N. Wang. Efficiency Improvements for Signature Schemes with Tight Security Reductions. In Proc. of ACM CCS, pages 155-164, 2003.
-
(2003)
Proc. of ACM CCS
, pp. 155-164
-
-
Katz, J.1
Wang, N.2
-
24
-
-
35048835796
-
A new paradigm Of hybrid encryption scheme
-
Advances in Cryptology - Crypto 2004, Springer-Verlag
-
K. Kurosawa and Y. Desmedt. A New Paradigm of Hybrid Encryption Scheme. In Advances in Cryptology - Crypto 2004, volume 3152 of LNCS, pages 426-442. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 426-442
-
-
Kurosawa, K.1
Desmedt, Y.2
-
25
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptology - Crypto 1984, Springer-Verlag
-
A. Shamir. Identity-Based Cryptosystems and Signature Schemes. In Advances in Cryptology - Crypto 1984, volume 196 of LNCS, pages 47-53. Springer-Verlag, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
26
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
Advances in Cryptology - Eurocrypt 1997, Springer-Verlag
-
V. Shoup. Lower Bounds for Discrete Logarithms and Related Problems. In Advances in Cryptology - Eurocrypt 1997, volume 1233 of LNCS, pages 256-266. Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 256-266
-
-
Shoup, V.1
-
27
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Advances in Cryptology - Eurocrypt 2005, Springer-Verlag
-
B. Waters. Efficient Identity-Based Encryption without Random Oracles. In Advances in Cryptology - Eurocrypt 2005, volume 3494 of LNCS, pages 114-127. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
|