-
1
-
-
33746353947
-
-
Cryptology ePrint Archive
-
M. Abdalla, D. Catalano, A. W. Dent, J. Malone-Lee, G. Neven, and N. P. Smart. Identity-based encryption gone wild. Cryptology ePrint Archive, 2006.
-
(2006)
Identity-based Encryption Gone Wild
-
-
Abdalla, M.1
Catalano, D.2
Dent, A.W.3
Malone-Lee, J.4
Neven, G.5
Smart, N.P.6
-
2
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway, Random oracles are practical: A paradigm for designing efficient protocols. In ACM CCS 1999, pages 62-73, 1993.
-
(1993)
ACM CCS 1999
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracles
-
EUROCRYPT 2004, Springer-Verlag
-
D. Boneh and X. Boyen. Efficient selective-ID secure identity based encryption without random oracles. In EUROCRYPT 2004, volume 3027 of LNCS, pages 223-238. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
4
-
-
24944562007
-
Hierarchical identity baaed encryption with constant sise ciphertext
-
EUROCRYPT 2005, Springer-Verlag
-
D. Boneh, X. Boyen, and E.-.I. Goh. Hierarchical identity baaed encryption with constant sise ciphertext. In EUROCRYPT 2005, volume 3494 of LNCS, pages 440-456, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-I.3
-
5
-
-
0037623983
-
Identity based encryption from the Weil pairing
-
D. Boneh and M. K. Franklin. Identity based encryption from the Weil pairing. SIAM Journal on Computing, 32 (3): 586-615, 2003.
-
(2003)
SIAM Journal on Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
6
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
EUROCRYPT 2004, Springer-Verlag
-
R. Canetti, S. Halevi, and J. Katz. Chosen-ciphertext security from identity-based encryption. In EUROCRYPT 2004, volume 3027 of LNCS, pages 207-222. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
7
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Cryptography and Coding, 8th IMA International Conference, Springer-Verlag
-
C. Cocks. An identity based encryption scheme based on quadratic residues. In Cryptography and Coding, 8th IMA International Conference, volume 2260 of LNCS, pages 360-363. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
8
-
-
70349557354
-
Hierarchical ID-based cryptography
-
ASIACRYPT 2002, Springer-Verlag
-
C. Gentry and A. Silverberg. Hierarchical ID-based cryptography. In ASIACRYPT 2002, volume 2501 of LNCS, pages 548-566. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
9
-
-
84947242701
-
Toward hierarchical identity-based encryption
-
EUROCRYPT 2002, Springer-Verlag
-
J. Horwitz and B. Lynn. Toward hierarchical identity-based encryption. In EUROCRYPT 2002, volume 2332 of LNCS, pages 466-481. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
10
-
-
0036475666
-
A new traitor tracing
-
S. Mitsunari, R. Saka, and M. Kasahara. A new traitor tracing. IEICE Transactions, E85-A(2):481-484, 2002.
-
(2002)
IEICE Transactions
, vol.E85-A
, Issue.2
, pp. 481-484
-
-
Mitsunari, S.1
Saka, R.2
Kasahara, M.3
-
11
-
-
2642549675
-
Cryptosystems based on pairing
-
Okinawa, Japan
-
R. Sakai, K. Ohgishi, and M. Kasahara. Cryptosystems based on pairing, In SCIS 2000, Okinawa, Japan, 2000.
-
(2000)
SCIS 2000
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
12
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
CRYPTO'84, Springer-Verlag
-
A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO'84, volume 196 of LNCS, pages 47-53. Springer-Verlag, 1985.
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
13
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
EUROCRYPT 2005, Springer-Verlag
-
B. R. Waters, Efficient identity-based encryption without random oracles. In EUROCRYPT 2005, volume 3494 of LNCS, pages 114-127, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.R.1
|