-
1
-
-
0345490607
-
Certificateless public key cryptography
-
Advances in Cryptology-Asiacrypt'2003, Springer-Verlag
-
S. Al-Riyami and K. Paterson, Certificateless public key cryptography, Advances in Cryptology-Asiacrypt'2003, Lecture Notes in Computer Science, vol. 2894, pages 452-473, Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.1
Paterson, K.2
-
2
-
-
24144438230
-
CBE from CL-PKE: A generic construction and efficient schemes
-
Public Key Cryptography-PKC'05, Springer-Verlag
-
S. Al-Riyami and K. Paterson, "CBE from CL-PKE: A generic construction and efficient schemes", Public Key Cryptography-PKC'05, Lecture Notes in Computer Science, vol. 3386, pages 398-415, Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 398-415
-
-
Al-Riyami, S.1
Paterson, K.2
-
3
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Advances in Cryptology-Crypto'2002, Springer-Verlag
-
P. Barreto, H. Kim, B. Lynn and M. Scott, Efficient algorithms for pairing-based cryptosystems, Advances in Cryptology-Crypto'2002, Lecture Notes in Computer Science, vol. 2442, pages 354-368, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 354-368
-
-
Barreto, P.1
Kim, H.2
Lynn, B.3
Scott, M.4
-
4
-
-
33645751082
-
Generic constructions of identity-based and certificateless KEMs
-
K. Bentahar, P. Farshirn, J. Malone-Lee, and N.P. Smart, Generic constructions of identity-based and certificateless KEMs. IACR Cryptology ePrint Archive, Report 2005/058, 2005.
-
(2005)
IACR Cryptology EPrint Archive, Report
, vol.2005
, Issue.58
-
-
Bentahar, K.1
Farshirn, P.2
Malone-Lee, J.3
Smart, N.P.4
-
5
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advances in Cryptology-Crypto'2001, Springer-Verlag
-
D. Boneh and F. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology-Crypto'2001, Lecture Notes in Computer Science, vol. 2139, pages 213-229, Springer-Verlag, 2001;
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, F.2
-
6
-
-
0037623983
-
-
SIAM J. COMPUT., 32(3): 586-615, 2003.
-
(2003)
SIAM J. COMPUT.
, vol.32
, Issue.3
, pp. 586-615
-
-
-
7
-
-
84946840347
-
Short signatures from the weil pairing
-
Advances in Cryptology-Asiacrypt'2001, Springer-Verlag
-
D. Boneh, B. Lynn and H. Shacham, Short signatures from the Weil pairing, Advances in Cryptology-Asiacrypt'2001, Lecture Notes in Computer Science, vol. 2248, pages 514-532, Springer-Verlag;
-
Lecture Notes in Computer Science
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
8
-
-
5644232839
-
-
J. Cryptology, 17(4): 297-319, 2004.
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
-
9
-
-
33645958856
-
Certificateless public key encryption without pairing
-
Proc. of the 8th Information Security Conference (ISC 2005), Springer-Verlag
-
J. Baek, R. Safavi-Naini and W. Susilo, Certificateless public key encryption without pairing, Proc. of the 8th Information Security Conference (ISC 2005), Lecture Notes in Computer Science, vol. 3650, pages 134-148, Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3650
, pp. 134-148
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
10
-
-
84944050090
-
Applications of multiple trust authorities in pairing based cryptosystems
-
InfraSec 2002, Springer-Verlag
-
L. Chen, K. Harrison, N. P. Smart, and D. Soldera, Applications of multiple trust authorities in pairing based cryptosystems, InfraSec 2002, Lecture Notes in Computer Science, vol. 2437, pages 260-275, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2437
, pp. 260-275
-
-
Chen, L.1
Harrison, K.2
Smart, N.P.3
Soldera, D.4
-
12
-
-
84921068281
-
On the exact security of Pull Domain Hash
-
Advances in Cryptology-Crypto'00, Springer-Verlag
-
J.S. Coron. On the exact security of Pull Domain Hash. Advances in Cryptology-Crypto'00, Lecture Notes in Computer Science, vol.1880, pages 229-235, Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 229-235
-
-
Coron, J.S.1
-
14
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
Advances in Cryptology-Eurocrypt'2003, Springer-Verlag
-
C. Gentry, Certificate-based encryption and the certificate revocation problem, Advances in Cryptology-Eurocrypt'2003, Lecture Notes in Computer Science, vol. 2656, pages 272-293, Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.2656
, pp. 272-293
-
-
Gentry, C.1
-
15
-
-
33744786523
-
On the security of a certificateless signature scheme
-
Cryptology and Network Security: 4th International Conference, Springer-Verlag
-
X.Y. Huang, W. Susilo, Y. Mu and F.T. Zhang, On the security of a certificateless signature scheme. Cryptology and Network Security: 4th International Conference, Lecture Notes in Computer Science, vol.3810, pages 13-25, Springer-Verlag, 2005
-
(2005)
Lecture Notes in Computer Science
, vol.3810
, pp. 13-25
-
-
Huang, X.Y.1
Susilo, W.2
Mu, Y.3
Zhang, F.T.4
-
16
-
-
23944473052
-
The exact security of an identity based signature and its applications
-
B. Libert and J.J. Quisquater. The exact security of an identity based signature and its applications, IACR Cryptology ePrint Archive, Report 2004/102, 2004.
-
(2004)
IACR Cryptology EPrint Archive, Report
, vol.2004
, Issue.102
-
-
Libert, B.1
Quisquater, J.J.2
-
17
-
-
35048847949
-
What is possible with identity based cryptography for PKIs and what still must be improved
-
EuroPKI 2004, Springer-Verlag
-
B. Libert and J.J. Quisquater, What is possible with identity based cryptography for PKIs and what still must be improved, EuroPKI 2004, Lecture Notes in Computer Science, vol. 3093, pages 57-70, Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3093
, pp. 57-70
-
-
Libert, B.1
Quisquater, J.J.2
-
18
-
-
84941163802
-
The pairing-based crypto lounge
-
The pairing-Based Crypto Lounge.. Web page maintained by Paulo Barreto. Available at: http://planeta.terra.com.br/informatica/paulobarreto/pblounge.html
-
Web Page Maintained by Paulo Barreto
-
-
-
19
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
Advances in Cryptology-Crypto'84, Springer-Verlag
-
A.Shamir, Identity based cryptosystems and signature schemes, Advances in Cryptology-Crypto'84, Lecture Notes in Computer Science, vol.196, pages 47-53, Springer-Verlag, 1984.
-
(1984)
Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
20
-
-
35048832495
-
Generic construction of certificateless signature
-
Proc. of Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Springer-Verlag
-
D.H. Yum and P.J. Lee, Generic construction of certificateless signature. Proc. of Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Lecture Notes in Computer Science, vol.3108, pages 200-211, Springer-Verlag, 2004
-
(2004)
Lecture Notes in Computer Science
, vol.3108
, pp. 200-211
-
-
Yum, D.H.1
Lee, P.J.2
|