-
1
-
-
33746332056
-
Identity-based encryption gone wild
-
ICALP 2006, of, Springer-Verlag
-
M. Abdalla, D. Catalano, A. Dent, J. Malone-Lee, G. Neven, and N. Smart. Identity-based encryption gone wild. In ICALP 2006, Part II, volume 4052 of LNCS, pages 300-311. Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.4052
, Issue.PART II
, pp. 300-311
-
-
Abdalla, M.1
Catalano, D.2
Dent, A.3
Malone-Lee, J.4
Neven, G.5
Smart, N.6
-
2
-
-
35248851617
-
Correlation-resistant storage via keyword-searchable encryption. Cryptology ePrint Archive
-
Report 2005/417
-
L. Ballard, M. Green, B. de Medeiros, and F. Monrose. Correlation-resistant storage via keyword-searchable encryption. Cryptology ePrint Archive, Report 2005/417, 2005. http://eprint.iacr.org/.
-
(2005)
-
-
Ballard, L.1
Green, M.2
de Medeiros, B.3
Monrose, F.4
-
3
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM Press
-
M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM CCS 93, pages 62-73. ACM Press, 1993.
-
(1993)
ACM CCS 93
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
35048887476
-
Short group signatures
-
CRYPTO 2004, of, Springer-Verlag
-
D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In CRYPTO 2004, volume 3152 of LNCS, pages 41-55. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
5
-
-
84957085257
-
An efficient public key traitor tracing scheme
-
CRYPTO'99, of, Springer-Verlag
-
D. Boneh and M. K. Franklin. An efficient public key traitor tracing scheme. In CRYPTO'99, volume 1666 of LNCS, pages 338-353. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 338-353
-
-
Boneh, D.1
Franklin, M.K.2
-
6
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
CRYPTO 2001, of, Springer-Verlag
-
D. Boneh and M. K. Franklin. Identity-based encryption from the Weil pairing. In CRYPTO 2001, volume 2139 of LNCS, pages 213-229. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
7
-
-
33746104815
-
Fully collusion resistant traitor tracing with short ciphertexts and private keys
-
EUROCRYPT 2006, of, Springer-Verlag
-
D. Boneh, A. Sahai, and B. Waters. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In EUROCRYPT 2006, volume 4004 of LNCS, pages 573-592. Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.4004
, pp. 573-592
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
8
-
-
84957670625
-
Collusion-secure fingerprinting for digital data (extended abstract)
-
CRYPTO'95, of, Springer-Verlag
-
D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data (extended abstract). In CRYPTO'95, volume 963 of LNCS, pages 452-465. Springer-Verlag, 1995.
-
(1995)
LNCS
, vol.963
, pp. 452-465
-
-
Boneh, D.1
Shaw, J.2
-
9
-
-
35048852705
-
Chosen-ciphertext security from identitybased encryption
-
EUROCRYPT 2004, of, Springer-Verlag
-
R. Canetti, S. Halevi, and J. Katz. Chosen-ciphertext security from identitybased encryption. In EUROCRYPT 2004, volume 3027 of LNCS, pages 207-222. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
10
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Cryptography and Coding, 8th IMA International Conference, of, Springer-Verlag
-
C. Cocks. An identity based encryption scheme based on quadratic residues. In Cryptography and Coding, 8th IMA International Conference, volume 2260 of LNCS, pages 360-363. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
11
-
-
84959054452
-
On crafty pirates and foxy tracers
-
ACM CCS Digital Rights Management Workshop 2001, of, Springer-Verlag
-
A. Kiayias and M. Yung. On crafty pirates and foxy tracers. In ACM CCS Digital Rights Management Workshop 2001, volume 2320 of LNCS, pages 22-39. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2320
, pp. 22-39
-
-
Kiayias, A.1
Yung, M.2
-
14
-
-
33646718113
-
Authenticated id-based key exchange and remote log-in with simple token and pin number. Cryptology ePrint Archive
-
Report 2002/164
-
M. Scott. Authenticated id-based key exchange and remote log-in with simple token and pin number. Cryptology ePrint Archive, Report 2002/164, 2002. http://eprint.iacr.org/.
-
(2002)
-
-
Scott, M.1
-
15
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
CRYPTO'84, of, Springer-Verlag
-
A. Shamir, Identity-based cryptosystems and signature schemes. In CRYPTO'84, volume 196 of LNCS, pages 47-53. Springer-Verlag, 1985.
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
16
-
-
0038447029
-
Optimal probabilistic fingerprint codes
-
ACM Press
-
G. Tardos. Optimal probabilistic fingerprint codes. In 35th ACM STOC, pages 116-125. ACM Press, 2003.
-
(2003)
35th ACM STOC
, pp. 116-125
-
-
Tardos, G.1
-
17
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
EUROCRYPT 2005, of, Springer-Verlag
-
B. R. Waters. Efficient identity-based encryption without random oracles. In EUROCRYPT 2005, volume 3494 of LNCS, pages 114-127. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.R.1
|