-
1
-
-
33745632083
-
Relations among notions of security for identity based encryption schemes
-
Latin American Theoretical Informatics (LATIN '06). Springer
-
N. Attrapadung, Y. Cui, D. Galindo, G. Hanaoka, I. Hasuo, H. Imai, K. Matsuura, P. Yang, and R. Zhang. Relations among notions of security for identity based encryption schemes. In Latin American Theoretical Informatics (LATIN '06), volume 3887 of LNCS, pages 130-141. Springer, 2006.
-
(2006)
LNCS
, vol.3887
, pp. 130-141
-
-
Attrapadung, N.1
Cui, Y.2
Galindo, D.3
Hanaoka, G.4
Hasuo, I.5
Imai, H.6
Matsuura, K.7
Yang, P.8
Zhang, R.9
-
2
-
-
27244435853
-
A note on effcient computation of cube roots in characteristic 3
-
P.S.L.M. Barreto. A note on effcient computation of cube roots in characteristic 3. Cryptology ePrint Archive, Report 2004/305, 2004. http://eprint.iacr.org/2004/305.
-
(2004)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.305
-
-
Barreto, P.S.L.M.1
-
3
-
-
84947906522
-
The exact security of digital signatures - How to sign with RSA and Rabin
-
Advances in Cryptology - EUROCRYPT '96. Springer
-
M. Bellare and P. Rogaway. The exact security of digital signatures - how to sign with RSA and Rabin. In Advances in Cryptology - EUROCRYPT '96, volume 1070 of LNCS, pages 399-416. Springer, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
35048841300
-
Efficient selective-ID identity based encryption without random oracles
-
Advances in Cryptology - EUROCRYPT '04. Springer
-
D. Boneh and X. Boyen. Efficient selective-ID identity based encryption without random oracles. In Advances in Cryptology - EUROCRYPT '04, volume 3027 of LNCS, pages 223-238. Springer, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
5
-
-
35048835319
-
Secure identity based encryption without random oracles
-
Advances in Cryptology - CRYPTO '04. Springer
-
D. Boneh and X. Boyen. Secure identity based encryption without random oracles. In Advances in Cryptology - CRYPTO '04, volume 3152 of LNCS, pages 443-459. Springer, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
6
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Advances in Cryptology - CRYPTO '01. Springer
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Advances in Cryptology - CRYPTO '01, volume 2139 of LNCS, pages 213-229. Springer, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
Full version of [6]
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. SIAM Journal on Computing, 32(3):586-615, 2003. Full version of [6].
-
(2003)
SIAM Journal on Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Advances in Cryptology - EUROCRYPT '04. Springer
-
R. Canetti, S. Halevi, and J. Katz. Chosen-ciphertext security from identity-based encryption. In Advances in Cryptology - EUROCRYPT '04, volume 3027 of LNCS, pages 207-222. Springer, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
9
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Proc. of the 8th IMA international conference on cryptography and coding. Springer
-
C. Cocks. An identity based encryption scheme based on quadratic residues. In Proc. of the 8th IMA international conference on cryptography and coding, volume 2260 of LNCS, pages 360-363. Springer, 2001.
-
(2001)
LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
10
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Advances in Cryptology - CRYPTO '86. Springer
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology - CRYPTO '86, volume 263 of LNCS, pages 186-194. Springer, 1987.
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
11
-
-
84956859011
-
How to enhance the security of public-key encryption at minimum cost
-
Proc. of Public Key Cryptography 1999. Springer
-
E. Fujisaki and T. Okamoto. How to enhance the security of public-key encryption at minimum cost. In Proc. of Public Key Cryptography 1999, volume 1560 of LNCS, pages 53-68. Springer, 1999.
-
(1999)
LNCS
, vol.1560
, pp. 53-68
-
-
Fujisaki, E.1
Okamoto, T.2
-
12
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Advances in Cryptology - CRYPTO '99. Springer
-
E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In Advances in Cryptology - CRYPTO '99, volume 1666 of LNCS, pages 537-554. Springer, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
13
-
-
0033908504
-
How to enhance the security of public-key encryption at minimum cost
-
Full version of [11]
-
E. Fujisaki and T. Okamoto. How to enhance the security of public-key encryption at minimum cost. IEICE Transactions Fundamentals, E83-A(1):24-32, 2000. Full version of [11].
-
(2000)
IEICE Transactions Fundamentals
, vol.E83-A
, Issue.1
, pp. 24-32
-
-
Fujisaki, E.1
Okamoto, T.2
-
14
-
-
26444618568
-
Boneh-Franklin identity based encryption revisited
-
Proc. of 32nd ICALP. Springer
-
D. Galindo. Boneh-Franklin Identity Based Encryption Revisited. In Proc. of 32nd ICALP, volume 3580 of LNCS, pages 791-802. Springer, 2005.
-
(2005)
LNCS
, vol.3580
, pp. 791-802
-
-
Galindo, D.1
-
15
-
-
27244434197
-
Efficient hardware for the Tate pairing calculation in characteristic three
-
Cryptographic Hardware and Embedded Systems - CUES 2005. Springer
-
T. Kerius, W.P. Marnane, E.M. Popovici, and P.S.L.M. Barreto. Efficient hardware for the Tate pairing calculation in characteristic three. In Cryptographic Hardware and Embedded Systems - CUES 2005, volume 3659 of LNCS, pages 412-426. Springer, 2005. Presentation file is available from http://islab.oregonstate.edu/ches/ches2005/presentations/.
-
(2005)
LNCS
, vol.3659
, pp. 412-426
-
-
Kerius, T.1
Marnane, W.P.2
Popovici, E.M.3
Barreto, P.S.L.M.4
-
16
-
-
26444602504
-
Identity based encryption without redundancy
-
Proc. of ACNS '05. Springer
-
B. Libert and J.J. Quisquater. Identity based encryption without redundancy. In Proc. of ACNS '05, volume 3531 of LNCS, pages 285-300. Springer, 2005.
-
(2005)
LNCS
, vol.3531
, pp. 285-300
-
-
Libert, B.1
Quisquater, J.J.2
-
17
-
-
84937543435
-
REACT: Rapid enhanced-security asymmetric cryptosystem transform
-
Topics in Cryptology - CT-RSA '01. Springer
-
T. Okamoto and D. Pointcheval. REACT: rapid enhanced-security asymmetric cryptosystem transform. In Topics in Cryptology - CT-RSA '01, volume 2020 of LNCS, pages 159-174. Springer, 2001.
-
(2001)
LNCS
, vol.2020
, pp. 159-174
-
-
Okamoto, T.1
Pointcheval, D.2
-
18
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptology - CRYPTO '84. Springer
-
A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology - CRYPTO '84, volume 196 of LNCS, pages 47-53. Springer, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
19
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Advances in Cryptology - EUROCRYPT '05. Springer
-
B. Waters. Efficient identity-based encryption without random oracles. In Advances in Cryptology - EUROCRYPT '05, volume 3494 of LNCS, pages 114-127. Springer, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
20
-
-
33745678280
-
Applying Fujisaki-Okamoto to identity-based encryption
-
Proc. of Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. Springer
-
P. Yang, T. Kitagawa, G. Hanaoka, R. Zhang, K. Matsuura, and H. Imai. Applying Fujisaki-Okamoto to identity-based encryption. In Proc. of Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, volume 3857 of LNCS, pages 183-192. Springer, 2006.
-
(2006)
LNCS
, vol.3857
, pp. 183-192
-
-
Yang, P.1
Kitagawa, T.2
Hanaoka, G.3
Zhang, R.4
Matsuura, K.5
Imai, H.6
|