-
2
-
-
38049067401
-
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption
-
Vietcrypt'06, to appear in
-
P.T.L. Anh, Y. Hanaoka, G. Hanaoka, K. Matsuura, H. Imai. Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. In Vietcrypt'06, to appear in LNCS series.
-
LNCS series
-
-
Anh, P.T.L.1
Hanaoka, Y.2
Hanaoka, G.3
Matsuura, K.4
Imai, H.5
-
3
-
-
79958074367
-
A Forward-Secure Digital Signature Scheme
-
Crypto'99, Springer
-
M. Bellare, S. Miner. A Forward-Secure Digital Signature Scheme. In Crypto'99, LNCS 1666, pp. 431-448. Springer, 1999.
-
(1666)
LNCS
, pp. 431-448
-
-
Bellare, M.1
Miner, S.2
-
5
-
-
35248832513
-
Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold. Cryptology ePrint Archive
-
Report 2002/064
-
M. Bellare, A. Palacio. Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold. Cryptology ePrint Archive: Report 2002/064, 2002.
-
(2002)
-
-
Bellare, M.1
Palacio, A.2
-
6
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracles
-
Eurocrypt'04, Springer
-
D. Boneh, X. Boyen. Efficient selective-ID secure identity based encryption without random oracles. In Eurocrypt'04, LNCS 3027, pp. 223-238. Springer, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
7
-
-
24944562007
-
Hierarchical Identity Based Encryption with Constant Size Ciphertext
-
Eurocrypt'05, Springer
-
D. Boneh, X. Boyen, E.-J. Goh. Hierarchical Identity Based Encryption with Constant Size Ciphertext. In Eurocrypt'05, LNCS 3494, pp. 440-456. Springer, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
8
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Springer
-
D. Boneh, M. Franklin. Identity-based encryption from the Weil pairing. In Crypto'01, LNCS2139, pp. 213-229. Springer, 2001.
-
(2001)
Crypto'01, LNCS2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Eurocrypt'03, of, Springer
-
D. Boneh, C. Gentry, B. Lynn, H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In Eurocrypt'03, volume 2656 of LNCS, pages 416432. Springer, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 416432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
10
-
-
24144453101
-
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption
-
CT-RSA '05, of, Springer
-
D. Boneh, J. Katz. Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. In CT-RSA '05, volume 3376 of LNCS, pages 87-103. Springer, 2005.
-
(2005)
LNCS
, vol.3376
, pp. 87-103
-
-
Boneh, D.1
Katz, J.2
-
11
-
-
84946840347
-
Short signatures from the Weil pairing
-
Asiacrypt'01, of, Springer
-
D. Boneh, B. Lynn, H. Shacham. Short signatures from the Weil pairing. In Asiacrypt'01, volume 2248 of LNCS, pages 514-532. Springer, 2002.
-
(2002)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
12
-
-
33745767987
-
Direct Chosen Ciphertext Security from IdentityBased Techniques
-
ACM Press
-
X. Boyen, Q. Mei, B. Waters. Direct Chosen Ciphertext Security from IdentityBased Techniques, in ACM CCS'05, ACM Press, pages 320-329, 2005.
-
(2005)
ACM CCS'05
, pp. 320-329
-
-
Boyen, X.1
Mei, Q.2
Waters, B.3
-
13
-
-
4243180376
-
The random oracle methodology, revisited
-
R. Canetti, O. Goldreich, S. Halevi. The random oracle methodology, revisited. Journal of the ACM 51(4), 557-594 (2004)
-
(2004)
Journal of the ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
14
-
-
35248897599
-
A forward secure public key encryption scheme
-
Eurocrypt'03, of, Springer
-
R. Canetti, S. Halevi, J. Katz. A forward secure public key encryption scheme. In Eurocrypt'03, volume 2656 of LNCS, pages 254-271. Springer, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 254-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
15
-
-
35048852705
-
Chosen-Ciphertext Security from Identity-Based Encryption
-
Eurocrypt'04, of, Springer
-
R. Canetti, S. Halevi, J. Katz. Chosen-Ciphertext Security from Identity-Based Encryption. In Eurocrypt'04, volume 3027 of LNCS, pages 207-222. Springer, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
16
-
-
35048843296
-
Secure Hierarchical Identity Based Signature and Its Application
-
ICICS'04, of, Springer
-
S. S. Chow, L. C. Kwong Hui, S. M. Yiu, K. P. Chow. Secure Hierarchical Identity Based Signature and Its Application. In ICICS'04, volume 3269 of LNCS, pages 480-494, Springer, 2004.
-
(2004)
LNCS
, vol.3269
, pp. 480-494
-
-
Chow, S.S.1
Kwong Hui, L.C.2
Yiu, S.M.3
Chow, K.P.4
-
17
-
-
0344232849
-
-
J. S. Coron, D. Naccache. Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. In Asiacrypt'03, 2894 of LNCS, pages 392-397. Springer, 2003.
-
J. S. Coron, D. Naccache. Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. In Asiacrypt'03, volume 2894 of LNCS, pages 392-397. Springer, 2003.
-
-
-
-
18
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
R. Cramer, V. Shoup, Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack, in SIAM Journal of Computing 33, pages 167-226, 2003.
-
(2003)
SIAM Journal of Computing
, vol.33
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
19
-
-
35248884707
-
Intrusion-Resilient Public-Key Encryption
-
CT-RSA '03, of, Springer
-
Y. Dodis, M. Franklin, J. Katz, A. Miyaji, M. Yung. Intrusion-Resilient Public-Key Encryption. In CT-RSA '03, volume 2612 of LNCS, pages 19-32. Springer, 2003.
-
(2003)
LNCS
, vol.2612
, pp. 19-32
-
-
Dodis, Y.1
Franklin, M.2
Katz, J.3
Miyaji, A.4
Yung, M.5
-
20
-
-
84947254092
-
Key-Insulated Public Key Cryptosystems
-
Eurocrypt'02, of, Springer
-
Y. Dodis, J. Katz, S. Xu, M. Yung. Key-Insulated Public Key Cryptosystems. In Eurocrypt'02, volume 2332 of LNCS, pages 65-82. Springer, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 65-82
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
21
-
-
35248813300
-
Strong key-insulated signature schemes
-
PKC'03, of, Springer
-
Y. Dodis, J. Katz, S. Xu, M. Yung. Strong key-insulated signature schemes. In PKC'03, volume 2567 of LNCS, pages 130-144. Springer, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 130-144
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
22
-
-
24144468589
-
Chosen-Ciphertext Security of Multiple Encryption
-
TCC'05, of, Springer
-
Y. Dodis, J. Katz. Chosen-Ciphertext Security of Multiple Encryption. In TCC'05, volume 3378 of LNCS, pages 188-209, Springer, 2005.
-
(2005)
LNCS
, vol.3378
, pp. 188-209
-
-
Dodis, Y.1
Katz, J.2
-
23
-
-
84956859011
-
How to enhance the security of public-key encryption at minimum cost
-
PKC'99, Springer
-
E. Fujisaki, T. Okamoto. How to enhance the security of public-key encryption at minimum cost. In PKC'99, LNCS 1560, pp. 53-68. Springer, 1999.
-
(1999)
LNCS
, vol.1560
, pp. 53-68
-
-
Fujisaki, E.1
Okamoto, T.2
-
24
-
-
70349557354
-
Hierarchical ID-based cryptography
-
Asiacrypt'02, of, Springer
-
C. Gentry, A. Silverberg, Hierarchical ID-based cryptography. In Asiacrypt'02, volume 2501 of LNCS, pages 548-566. Springer, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
25
-
-
33749564652
-
On Computing Products of Pairings. Cryptology ePrint Archive
-
Report 2006/172
-
R. Granger, N. P. Smart. On Computing Products of Pairings. Cryptology ePrint Archive: Report 2006/172, 2006.
-
(2006)
-
-
Granger, R.1
Smart, N.P.2
-
26
-
-
33745820265
-
Parallel Key-Insulated Public Key Encryption
-
PKC'06, of, Springer
-
G. Hanaoka, Y. Hanaoka, H. Imai. Parallel Key-Insulated Public Key Encryption. In PKC'06, volume 3958 of LNCS, pages 105-122, Springer, 2006.
-
(2006)
LNCS
, vol.3958
, pp. 105-122
-
-
Hanaoka, G.1
Hanaoka, Y.2
Imai, H.3
-
27
-
-
84937422774
-
SiBIR: Signer-Base Intrusion-Resilient Signatures
-
Crypto'02, of, Springer
-
G. Itkis, L. Reyzin. SiBIR: Signer-Base Intrusion-Resilient Signatures. In Crypto'02, volume 2442 of LNCS, pages 499-514, Springer, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 499-514
-
-
Itkis, G.1
Reyzin, L.2
-
28
-
-
84946844750
-
Round Protocol for Tripartite Diffie-Hellman
-
ANTS'00, of, Springer
-
A. Joux. A One Round Protocol for Tripartite Diffie-Hellman. In ANTS'00, volume 1838 of LNCS, pages 385-394, Springer, 2000.
-
(2000)
LNCS
, vol.1838
, pp. 385-394
-
-
Joux, A.1
One, A.2
-
29
-
-
1642415603
-
A Forward-Secure Public-Key Encryption Scheme. Cryptology ePrint Archive
-
Report 2002/060
-
J. Katz. A Forward-Secure Public-Key Encryption Scheme. Cryptology ePrint Archive: Report 2002/060, 2002.
-
(2002)
-
-
Katz, J.1
-
30
-
-
33745826939
-
On the Limitations of the Spread of an IBE-to-PKE Transformation
-
PKC'06, Springer
-
E. Kiltz. On the Limitations of the Spread of an IBE-to-PKE Transformation. In PKC'06, LNCS 3958, pp. 274-289, Springer, 2006.
-
(2006)
LNCS
, vol.3958
, pp. 274-289
-
-
Kiltz, E.1
-
31
-
-
38049004199
-
Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts. Cryptology ePrint Archive
-
Report 2006/122
-
E. Kiltz. Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts. Cryptology ePrint Archive: Report 2006/122, 2006.
-
(2006)
-
-
Kiltz, E.1
-
32
-
-
33746324862
-
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles
-
ACISP'06, of, Springer
-
E. Kiltz, D. Galindo. Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. In ACISP'06, volume 4058 of LNCS, pages 336-347 Springer, 2006.
-
(2006)
LNCS
, vol.4058
, pp. 336-347
-
-
Kiltz, E.1
Galindo, D.2
-
33
-
-
33746066354
-
Sequential Aggregate Signatures and Multisignatures Without Random Oracles
-
Eurocrypt'06, of, Springer
-
S. Lu, R. Ostrovsky, A. Sahai, H. Shacham, B. Waters. Sequential Aggregate Signatures and Multisignatures Without Random Oracles. In Eurocrypt'06, volume 4004 of LNCS, pages 465-485, Springer, 2006.
-
(2006)
LNCS
, vol.4004
, pp. 465-485
-
-
Lu, S.1
Ostrovsky, R.2
Sahai, A.3
Shacham, H.4
Waters, B.5
-
34
-
-
33746372179
-
Efficient Identity-based Signatures Secure in the Standard Model
-
ACISP'06, of, Springer
-
K. G. Paterson, J. C. N. Schuldt. Efficient Identity-based Signatures Secure in the Standard Model. In ACISP'06, volume 4058 of LNCS, pages 207-222, Springer, 2006.
-
(2006)
LNCS
, vol.4058
, pp. 207-222
-
-
Paterson, K.G.1
Schuldt, J.C.N.2
-
35
-
-
84948976239
-
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
-
Eurocrypt'00, of, Springer
-
V. Shoup. Using Hash Functions as a Hedge against Chosen Ciphertext Attack. In Eurocrypt'00, volume 1807 of LNCS, pages 275-288, Springer, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 275-288
-
-
Shoup, V.1
-
36
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
Crypto'84, of, Springer
-
A. Shamir. Identity based cryptosystems and signature schemes. In Crypto'84, volume 196 of LNCS, pages 47-53. Springer, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
37
-
-
24944566040
-
Efficient Identity-Based Encryption Without Random Oracles
-
Eurocrypt'05, of, Springer
-
B. Waters. Efficient Identity-Based Encryption Without Random Oracles. In Eurocrypt'05, volume 3494 of LNCS, pages 114-127. Springer 2005.
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
38
-
-
14844297376
-
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption
-
ACM Press
-
D. Yao, N. Fazio, Y. Dodis, A. Lysyanskaya. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. In ACM CCS'04, ACM Press, pages 354-363, 2004.
-
(2004)
ACM CCS'04
, pp. 354-363
-
-
Yao, D.1
Fazio, N.2
Dodis, Y.3
Lysyanskaya, A.4
|