-
2
-
-
35048848152
-
Short signatures without the random oracles
-
Springer-Verlag
-
D. Boneh and X. Boyen. Short signatures without the random oracles. In Advances in Cryptology - EUROCRYPT 2004. LNCS 3027, pages 56-73. Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology - EUROCRYPT 2004. LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
3
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Springer-Verlag
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Advances in Cryptology - CRYPTO'2002, LNCS 2139, pages 213-229. Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology - CRYPTO'2002, LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
84946840347
-
Short signatures from the Weil pairing
-
Springer-Verlag
-
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the Weil pairing. In Advances in Cryptology - ASIACRYPT 2001, LNCS 2248, pages 514-532. Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology - ASIACRYPT 2001, LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
5
-
-
84944050090
-
Applications of multiple trust authorities in pairing based cryptosystems
-
Springer-Verlag
-
L. Chen, K. Harrison, N. P. Smart, and D. Soldera. Applications of multiple trust authorities in pairing based cryptosystems. In InfraSec 2002, LNCS 2437, pages 260-275. Springer-Verlag, 2002.
-
(2002)
InfraSec 2002, LNCS
, vol.2437
, pp. 260-275
-
-
Chen, L.1
Harrison, K.2
Smart, N.P.3
Soldera, D.4
-
6
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. C. van Oorschot, and M. J. Wiener. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2(2): 107-125, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
7
-
-
23944503487
-
Separable and anonymous identity-based key issuing
-
Washington, DC, USA. IEEE Computer Society
-
A. fen Sui, S. S. M. Chow, L. C. K. Hui, S. M. Yiu, K. P. Chow, W. W. Tsang, C. F. Chong, K. H. Pun, and H. W. Chan. Separable and anonymous identity-based key issuing. In ICPADS '05: Proceedings of the 11th International Conference on Parallel and Distributed. Systems - Workshops (ICPADS'05), pages 275-279, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
ICPADS '05: Proceedings of the 11th International Conference on Parallel and Distributed. Systems - Workshops (ICPADS'05)
, pp. 275-279
-
-
Sui, A.F.1
Chow, S.S.M.2
Hui, L.C.K.3
Yiu, S.M.4
Chow, K.P.5
Tsang, W.W.6
Chong, C.F.7
Pun, K.H.8
Chan, H.W.9
-
8
-
-
24744468599
-
An efficient secure key issuing protocol in id-based cryptosystems
-
Washington, DC, USA. IEEE Computer Society
-
R. Gangishetti, M. Gorantla, M. Das, A. Saxena, and V. Gulati. An efficient secure key issuing protocol in id-based cryptosystems. In Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05)- Volume I, pages 674-678, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05)- Volume I
, pp. 674-678
-
-
Gangishetti, R.1
Gorantla, M.2
Das, M.3
Saxena, A.4
Gulati, V.5
-
9
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
Springer-Verlag
-
C. Gentry. Certificate-based encryption and the certificate revocation problem. In Advances in Cryptology - EURO-CRPYT 2003, LNCS 2656, pages 272-293. Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology - EURO-CRPYT 2003, LNCS
, vol.2656
, pp. 272-293
-
-
Gentry, C.1
-
10
-
-
0038087188
-
Separating decision diffie-hellman from diffie-hellman in cryptographic groups
-
A. Joux and K. Nguyen. Separating decision diffie-hellman from diffie-hellman in cryptographic groups. Cryptology ePrint Archive, Report 2001/003, 2001.
-
(2001)
Cryptology EPrint Archive, Report
, vol.2001
, Issue.3
-
-
Joux, A.1
Nguyen, K.2
-
11
-
-
24744440154
-
Secure key issuing in id-based cryptography
-
Darlinghurst, Australia, Australia. Australian Computer Society, Inc.
-
B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang, and S. Yoo. Secure key issuing in id-based cryptography. In CRPIT '04: Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation, pages 69-74, Darlinghurst, Australia, Australia, 2004. Australian Computer Society, Inc.
-
(2004)
CRPIT '04: Proceedings of the Second Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation
, pp. 69-74
-
-
Lee, B.1
Boyd, C.2
Dawson, E.3
Kim, K.4
Yang, J.5
Yoo, S.6
-
12
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer-Verlag
-
A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology - Asiacrypt'2003, LNCS 196, pages 47-53. Springer-Verlag, 1985.
-
(1985)
Advances in Cryptology - Asiacrypt'2003, LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
|