-
1
-
-
0345490607
-
Certificateless public key cryptography
-
Advances in Cryptology - ASIACRYPT 2003, Springer-Verlag
-
S. Al-Riyami and K.G. Paterson. Certificateless public key cryptography. In Advances in Cryptology - ASIACRYPT 2003, LNCS vol. 2894, pp. 452-473, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.1
Paterson, K.G.2
-
2
-
-
24144438230
-
CBE from CL-PKE: A generic construction and efficient scheme
-
Public Key Cryptography - PKC 2005, Springer-Verlag
-
S. Al-Riyami and K.G. Paterson. CBE from CL-PKE: A generic construction and efficient scheme. Public Key Cryptography - PKC 2005, LNCS vol. 3386, pp. 398-415, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3386
, pp. 398-415
-
-
Al-Riyami, S.1
Paterson, K.G.2
-
3
-
-
33645958856
-
Certificateless public key encryption without pairing
-
Information Security Conference - ISC 2005, Springer-Verlag
-
J. Baek, R. Safavi-Naini and W. Susilo. Certificateless Public Key Encryption Without Pairing. Information Security Conference - ISC 2005, LNCS vol. 3650, pp. 134-148, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3650
, pp. 134-148
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
4
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Advances in Cryptology - CRYPTO 1998, Springer-Verlag
-
M. Bellare, A. Desai, D. Pointcheval and P. Rogaway. Relations Among Notions of Security for Public-Key Encryption Schemes. Advances in Cryptology - CRYPTO 1998, LNCS vol. 1462, pp. 26-45, Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
6
-
-
84874324906
-
Identity-based encryption. From the weil pairing
-
Advances in Cryptology - Crypto 2001, Springer-Verlag
-
D. Boneh and M Franklin. Identity-Based Encryption. From The Weil Pairing, Advances in Cryptology - Crypto 2001, LNCS vol. 2139, pp. 213-229, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM Press
-
M. Bellare and P. Rogaway. Random Oracles are Practical: a Paradigm for Designing Efficient Protocols. ACM CCS 93, pp. 62-73, ACM Press, 1993.
-
(1993)
ACM CCS 93
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
4243180376
-
The random oracle methodology, revisited
-
ACM press
-
R. Canetti, O. Goldreich and S. Halevi. The random oracle methodology, revisited. Journal of the ACM vol. 51, num. 4, pp. 557-594, ACM press, 2004.
-
(2004)
Journal of the ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
9
-
-
84941156716
-
On proofs of security for certificateless cryptosystems
-
Report 2005/348
-
A. Dent and C. Kudla. On Proofs of Security for Certificateless Cryptosystems. Cryptology ePrint Archive, Report 2005/348.
-
Cryptology EPrint Archive
-
-
Dent, A.1
Kudla, C.2
-
10
-
-
24144468589
-
Chosen-ciphertext security of multiple encryption
-
Theory of Cryptography Conference - TCC 2005, Springer-Verlag
-
Y. Dodis and J. Katz. Chosen-Ciphertext Security of Multiple Encryption, Theory of Cryptography Conference - TCC 2005, LNCS vol. 3378, pp. 188-209, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3378
, pp. 188-209
-
-
Dodis, Y.1
Katz, J.2
-
11
-
-
35248866223
-
Certificate-based encryption and the certificate-revocation problem
-
Advances in Cryptology - Eurocrypt 2003, Springer-Verlag
-
C. Gentry. Certificate-Based Encryption and the Certificate-Revocation Problem, Advances in Cryptology - Eurocrypt 2003, LNCS vol. 2656, pp. 272-291, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 272-291
-
-
Gentry, C.1
-
12
-
-
58349122471
-
It is possible to have CBE from CL-PKE?
-
Report 2005/431
-
B.G. Kang and J.H. Park. It is possible to have CBE from CL-PKE? Cryptology ePrint Archive, Report 2005/431, 2005. http://eprint.iacr.org/.
-
(2005)
Cryptology EPrint Archive
-
-
Kang, B.G.1
Park, J.H.2
-
13
-
-
33745833916
-
On constructing certificateless cryptosystems from identity based encryption
-
Public Key Cryptography 2006 - PKC 2006, Springer-Verlag
-
B. Libert and J.J. Quisquater. On Constructing Certificateless Cryptosystems from Identity Based Encryption. Public Key Cryptography 2006 - PKC 2006, LNCS vol. 3958, pp. 474-490, Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.3958
, pp. 474-490
-
-
Libert, B.1
Quisquater, J.J.2
-
14
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptology - Crypto 1984, Springer-Verlag
-
A. Shamir. Identity-based cryptosystems and signature schemes, Advances in Cryptology - Crypto 1984, LNCS vol. 196, pp. 47-53, Springer-Verlag, 1985.
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
15
-
-
33645584388
-
Generic construction of certificateless encryption
-
Computational Science and Its Applications - ICCSA 2004, Springer-Verlag
-
D.H. Yum and P.J. Lee. Generic Construction of Certificateless Encryption. In Computational Science and Its Applications - ICCSA 2004, LNCS vol. 3043, pp. 802-811, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3043
, pp. 802-811
-
-
Yum, D.H.1
Lee, P.J.2
-
16
-
-
33645601534
-
Identity-based cryptography in public key management
-
EuroPKI 2004, Springer-Verlag
-
D.H. Yum and P.J. Lee. Identity-based cryptography in public key management. In EuroPKI 2004, LNCS vol. 3093, pp. 71-84, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3093
, pp. 71-84
-
-
Yum, D.H.1
Lee, P.J.2
|