-
1
-
-
84946837370
-
Key-privacy in public-key encryption
-
ASIACRYPT '01: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. Springer-Verlag
-
Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: ASIACRYPT '01: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. Volume 2238 of LNCS., Springer-Verlag (2001) 566-582
-
(2001)
LNCS
, vol.2238
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
2
-
-
84979291225
-
Broadcast encryption
-
CRYPTO '93: Proceedings of Advances in Cryptology. Springer-Verlag
-
Fiat, A., Naor, M.: Broadcast encryption. In: CRYPTO '93: Proceedings of Advances in Cryptology. Volume 773 of LNCS., Springer-Verlag (1994) 480-491
-
(1994)
LNCS
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
3
-
-
84944319284
-
Efficient trace and revoke schemes
-
Financial cryptography 2000. Springer-Verlag
-
Naor, M., Pinkas, B.: Efficient trace and revoke schemes. In: Financial cryptography 2000. Volume 1962 of LNCS., Springer-Verlag (2000) 1-20
-
(2000)
LNCS
, vol.1962
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
-
4
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
CRYPTO '01: Proceedings of Advances in Cryptology Springer-Verlag
-
Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: CRYPTO '01: Proceedings of Advances in Cryptology. Volume 2139 of LNCS., Springer-Verlag (2001) 41-62
-
(2001)
LNCS
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
5
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
CRYPTO '05: Proceedings of Advances in Cryptology. Springer-Verlag
-
Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: CRYPTO '05: Proceedings of Advances in Cryptology. Volume 3621 of LNCS., Springer-Verlag (2005) 258-275
-
(2005)
LNCS
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
6
-
-
84948957152
-
Public-key encryption in a multi-user setting: Security proofs and improvements
-
EUROCRYPT '00: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques Springer-Verlag
-
Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: Security proofs and improvements. In: EUROCRYPT '00: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques. Volume 1807 of LNCS., Springer-Verlag (2000) 259-274
-
(2000)
LNCS
, vol.1807
, pp. 259-274
-
-
Bellare, M.1
Boldyreva, A.2
Micali, S.3
-
8
-
-
84941164863
-
-
Werner Koch: The GNU privacy guard (2005) http://www.gnupg.org/.
-
(2005)
The GNU Privacy Guard
-
-
-
10
-
-
0005893506
-
-
Callas, J., Donnerhacke, L., Finney, H., Thayer, R.: RFC 2440: OpenPGP message format (1998) http://www.ietf.org/rfc/rfc2440.txt.
-
(1998)
RFC 2440: OpenPGP Message Format
-
-
Callas, J.1
Donnerhacke, L.2
Finney, H.3
Thayer, R.4
-
11
-
-
0003508562
-
-
National Institute of Standards and Technology: Digital signature standard (DSS) (2000) http://www.csrc.nist.gov/publications/fips/.
-
(2000)
Digital Signature Standard (DSS)
-
-
-
12
-
-
84941156998
-
-
VeriSign: Search for digital IDs (2005) https://digitalid.verisign.com/ services/client/.
-
(2005)
Search for Digital IDs
-
-
-
13
-
-
0003605145
-
Constructing digital signatures from a one way function
-
SRI International
-
Lamport, L.: Constructing digital signatures from a one way function. Technical report, SRI International (1979)
-
(1979)
Technical Report
-
-
Lamport, L.1
-
16
-
-
0038087188
-
Separating decision Diffie-Hellman from Diffie-Hellman in cryptographic groups
-
eprint.iacr.org/2001/003
-
Joux, A., Nguyen, K.: Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups. Technical Report eprint.iacr.org/2001/ 003 (2001)
-
(2001)
Technical Report
-
-
Joux, A.1
Nguyen, K.2
-
17
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
CRYPTO '84: Advances in Cryptology Springer-Verlag
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: CRYPTO '84: Advances in Cryptology. Volume 196 of LNCS., Springer-Verlag (1985) 47-53
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
18
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
CRYPTO '01: Proceedings of Advances in Cryptology. Springer-Verlag
-
Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. In: CRYPTO '01: Proceedings of Advances in Cryptology. Volume 2139 of LNCS., Springer-Verlag (2001) 213-229
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
19
-
-
35048901123
-
Public key encryption with keyword search
-
EUROCRYPT '04: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques. Springer-Verlag
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: EUROCRYPT '04: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques. Volume 3027 of LNCS., Springer-Verlag (2004) 506-522
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
20
-
-
33750089381
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
eprint.iacr.org/2005/254
-
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Technical Report eprint.iacr.org/2005/254 (2005)
-
(2005)
Technical Report
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
|