-
1
-
-
84874324906
-
Identity based encryption from the Weil pairing
-
Crypto 2001
-
D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing," Crypto 2001, LNCS Vol. 2139, pp. 213-229, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
2
-
-
79958074367
-
A forward-secure digital signature scheme
-
Crypto 1999
-
M. Bellare and S. Miner, "A forward-secure digital signature scheme," Crypto 1999, LNCS Vol. 1666, pp. 431-448, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 431-448
-
-
Bellare, M.1
Miner, S.2
-
3
-
-
35248832513
-
Protecting against key exposure: Strong key-insulated encryption with optimal threshold
-
M. Bellare and A. Palacio, "Protecting against key exposure: strong key-insulated encryption with optimal threshold," Cryptology ePrint archive 2002/064, http://eprint.iacr.org/, 2002.
-
(2002)
Cryptology ePrint Archive 2002/064
-
-
Bellare, M.1
Palacio, A.2
-
4
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
PKC 2003
-
J. C. Cha and J. H. Cheon, "An identity-based signature from gap Diffie-Hellman groups," PKC 2003, LNCS Vol. 2567, pp. 18-30, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
5
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
Eurocrypt 2003
-
R. Canetti, S. Halevi and J. Katz, "A forward-secure public-key encryption scheme," Eurocrypt 2003, LNCS Vol. 2656, pp. 256-271, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 256-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
6
-
-
85023809951
-
Threshold cryptosystems
-
Crypto 1989
-
Y. Desmedt and Y. Frankel, "Threshold cryptosystems," Crypto 1989, LNCS Vol. 435, pp. 307-315, 1989.
-
(1989)
LNCS
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
7
-
-
35248884707
-
Intrusion-resilient public-key encryption
-
CT-RSA 2003
-
Y. Dolis, M. Franklin, J. Katz, A. Miyaji, and M. Yung, "Intrusion-resilient public-key encryption," CT-RSA 2003, LNCS Vol. 2612, pp. 19-32, 2003.
-
(2003)
LNCS
, vol.2612
, pp. 19-32
-
-
Dolis, Y.1
Franklin, M.2
Katz, J.3
Miyaji, A.4
Yung, M.5
-
8
-
-
84947254092
-
Key-insulated public key cryptosystems
-
Eurocrypt 2002
-
Y. Dolis, J. Katz, S. Xu and M. Yung, "Key-insulated public key cryptosystems," Eurocrypt 2002, LNCS Vol. 2332, pp. 65-82, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 65-82
-
-
Dolis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
9
-
-
35248813300
-
Strong key-insulated signature schemes
-
PKC 2003
-
Y. Dolis, J. Katz, S. Xu and M. Yung, "Strong key-insulated signature schemes," PKC 2003, LNCS Vol.2567, pp.130-144, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 130-144
-
-
Dolis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
10
-
-
35248867510
-
Efficient Identity Based Signature Schemes Based on Pairings
-
SAC 2002
-
F. Hess, "Efficient Identity Based Signature Schemes Based on Pairings," SAC 2002, LNCS Vol. 2595, pp. 310-324, 2003.
-
(2003)
LNCS
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
11
-
-
84937422774
-
SiBIR: Siner-base intrusion-resilient signatures
-
Crypto 2002
-
G. Itkis and L. Reyzin, "SiBIR: Siner-base intrusion-resilient signatures," Crypto 2002, LNCS Vol. 2442, pp. 499-514, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 499-514
-
-
Itkis, G.1
Reyzin, L.2
-
12
-
-
33747838524
-
Intrusion-resilient signatures: Generic constructions, or defeating strong adversary with minimal assumptions
-
SCN 2002
-
G. Itkis, "Intrusion-resilient signatures: generic constructions, or defeating strong adversary with minimal assumptions," SCN 2002, LNCS Vol. 2576, pp.102-118, 2003.
-
(2003)
LNCS
, vol.2576
, pp. 102-118
-
-
Itkis, G.1
-
13
-
-
3042553102
-
Non-interactive public-key cryptography
-
Crypto 1991
-
U. Maurer and Y. Yacobi, "Non-interactive public-key cryptography," Crypto 1991, LNCS Vol. 547, pp. 498-507, 1991.
-
(1991)
LNCS
, vol.547
, pp. 498-507
-
-
Maurer, U.1
Yacobi, Y.2
-
14
-
-
85027164480
-
How to withstand mobile virus attacks
-
R. Ostrovsky and M. Yung, "How to withstand mobile virus attacks," PODC 1991, pp 51-59, 1991.
-
(1991)
PODC 1991
, pp. 51-59
-
-
Ostrovsky, R.1
Yung, M.2
-
15
-
-
0037194815
-
ID-based signatures from pairings on elliptic curves
-
K. G. Paterson, "ID-based signatures from pairings on elliptic curves," Electronics Letters Vol. 38 (18), pp. 1025-1026, 2002.
-
(2002)
Electronics Letters
, vol.38
, Issue.18
, pp. 1025-1026
-
-
Paterson, K.G.1
-
16
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Crypto 1991
-
T. Pedersen, "Non-interactive and information-theoretic secure verifiable secret sharing," Crypto 1991, LNCS Vol. 576, pp. 129-140, 1991.
-
(1991)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.1
-
17
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Comm. ACM, 22(11), pp. 612-613, 1979.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
18
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Crypto 1994
-
A. Shamir, "Identity-based cryptosystems and signature schemes," Crypto 1994, LNCS Vol. 196, pp. 47-53, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
19
-
-
85032215902
-
A realization scheme for the identity-based cryptosystem
-
Crypto 1987
-
H. Tanaka, "A realization scheme for the identity-based cryptosystem," Crypto 1987, LNCS Vol. 293, pp. 341-349, 1987.
-
(1987)
LNCS
, vol.293
, pp. 341-349
-
-
Tanaka, H.1
-
20
-
-
0024664858
-
An ID-based cryptosystem based on the discrete logarithm problem
-
S. Tsuji and T. Itoh, "An ID-based cryptosystem based on the discrete logarithm problem," IEEE Journal on Selected Areas in Communication, Vol. 7, pp. 467-473, 1989.
-
(1989)
IEEE Journal on Selected Areas in Communication
, vol.7
, pp. 467-473
-
-
Tsuji, S.1
Itoh, T.2
|