-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Proc. CRYPTO 84
-
Shamir, A.: ' Identity-based cryptosystems and signature schemes ', Lect. Notes Comput. Sci., 1984, 196, p. 47-53, Proc. CRYPTO 84
-
(1984)
Lect. Notes Comput. Sci.
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Proc. CRYPTO 2001, Full version: (same title) SIAM J. Comput., 2003, 32, (3), 586-615
-
Boneh, D., and Franklin, M.: ' Identity-based encryption from the Weil pairing ', Lect. Notes Comput. Sci., 2001, 2139, p. 213-29, Proc. CRYPTO 2001, Full version: (same title) SIAM J. Comput., 2003, 32, (3), 586-615
-
(2001)
Lect. Notes Comput. Sci.
, vol.2139
, pp. 213-29
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
35248897599
-
A forward-secure public-key Encryption scheme
-
Proc. EUROCRYPT 2003
-
Canetti, R., Halevi, S., and Katz, J.: ' A forward-secure public-key Encryption scheme ', Lect. Notes Comput. Sci., 2003, 2656, p. 255-271, Proc. EUROCRYPT 2003
-
(2003)
Lect. Notes Comput. Sci.
, vol.2656
, pp. 255-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
4
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Proc. EUROCRYPT 2004
-
Canetti, R., Halevi, S., and Katz, J.: ' Chosen-ciphertext security from identity-based encryption ', Lect. Notes Comput. Sci., 2004, 3027, p. 207-222, Proc. EUROCRYPT 2004
-
(2004)
Lect. Notes Comput. Sci.
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
5
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM Press
-
Bellare, M., and Rogaway, P.: ' Random oracles are practical: a paradigm for designing efficient protocols ', Proc. First Annual Conf. on Computer and Commmunications Security, 1993, ACM Press, p. 62-73
-
(1993)
Proc. First Annual Conf. on Computer and Commmunications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
35148899803
-
-
FIPS 180-1: 'Secure hash standard'. Federal Information Processing Standards Publication 180-1, US Department of Commerce NIST, National Technical Information Service, Springfield, VA, 17 April 1995 (supersedes FIPS pub 180)
-
FIPS 180-1: 'Secure hash standard'. Federal Information Processing Standards Publication 180-1, US Department of Commerce NIST, National Technical Information Service, Springfield, VA, 17 April 1995 (supersedes FIPS pub 180)
-
-
-
-
7
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Cocks, C.: ' An identity based encryption scheme based on quadratic residues ', Cryptography and Coding, 8th IMA Int. Conf., 2001, p. 360-363
-
(2001)
Cryptography and Coding, 8th IMA Int. Conf.
, pp. 360-363
-
-
Cocks, C.1
-
8
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracles
-
Proc EUROCRYPT, 2004
-
Boneh, D., and Boyen, X.: ' Efficient selective-ID secure identity based encryption without random oracles ', Lect. Notes Comput. Sci., 2004, 3027, p. 223-238, Proc EUROCRYPT, 2004
-
(2004)
Lect. Notes Comput. Sci.
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
9
-
-
35048835319
-
Secure identity based encryption without random oracles
-
Proc. CRYPTO 2004
-
Boneh, D., and Boyen, X.: ' Secure identity based encryption without random oracles ', Lect. Notes Comput. Sci., 2004, 3152, p. 443-459, Proc. CRYPTO 2004
-
(2004)
Lect. Notes Comput. Sci.
, vol.3152
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
10
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Proc. EUROCRYPT 2005
-
Waters, B.: ' Efficient identity-based encryption without random oracles ', Lect. Notes Comput. Sci., 2005, 3494, p. 114-127, Proc. EUROCRYPT 2005
-
(2005)
Lect. Notes Comput. Sci.
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
11
-
-
33745840439
-
Trading time for space: Towards an efficient IBE scheme with short(er) public parameters in the standard model
-
Proc. ICISC 2005
-
Chatterjee, S., and Sarkar, P.: ' Trading time for space: towards an efficient IBE scheme with short(er) public parameters in the standard model ', Lect. Notes Comput. Sci., 2006, 3935, Proc. ICISC 2005
-
(2006)
Lect. Notes Comput. Sci.
, vol.3935
-
-
Chatterjee, S.1
Sarkar, P.2
-
13
-
-
33745767987
-
Simple and efficient CCA2 security from IBE techniques
-
Boyen, X., Mei, Q., and Waters, B.: ' Simple and efficient CCA2 security from IBE techniques ', ACM Conf. on Computer and Communications Security - CCS, 2005, p. 320-329
-
(2005)
ACM Conf. on Computer and Communications Security - CCS
, pp. 320-329
-
-
Boyen, X.1
Mei, Q.2
Waters, B.3
-
15
-
-
33745561884
-
Ring signatures: Stronger definitions, and constructions without random oracles
-
Theory of Cryptography, Proc. Third Theory of Cryptography Conf., TCC 2006
-
Bender, A., Katz, J., and Morselli, R.: ' Ring signatures: stronger definitions, and constructions without random oracles ', Lect. Notes Comput. Sci., 2006, 3876, p. 60-79, Theory of Cryptography, Proc. Third Theory of Cryptography Conf., TCC 2006
-
(2006)
Lect. Notes Comput. Sci.
, vol.3876
, pp. 60-79
-
-
Bender, A.1
Katz, J.2
Morselli, R.3
-
16
-
-
33746042155
-
Compact group signatures without random oracles
-
Proc. EUROCRYPT 2006
-
Boyen, X., and Waters, B.: ' Compact group signatures without random oracles ', Lect. Notes Comput. Sci., 2006, 4004, p. 427-444, Proc. EUROCRYPT 2006
-
(2006)
Lect. Notes Comput. Sci.
, vol.4004
, pp. 427-444
-
-
Boyen, X.1
Waters, B.2
-
17
-
-
33745554010
-
Efficient blind and partially blind signatures without random oracles
-
Theory of Cryptography, Proc. Third Theory of Cryptography Conf., TCC 2006
-
Okamoto, T.: ' Efficient blind and partially blind signatures without random oracles ', Lect. Notes Comput. Sci., 2006, 3876, p. 80-99, Theory of Cryptography, Proc. Third Theory of Cryptography Conf., TCC 2006
-
(2006)
Lect. Notes Comput. Sci.
, vol.3876
, pp. 80-99
-
-
Okamoto, T.1
|