-
1
-
-
0030687206
-
Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts. IEICE Trans
-
Mambo, M., Okamoto, E.: Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts. IEICE Trans. Fund. Electronics Communications and Computer Science E80-A/1 (1997) 54-63
-
(1997)
Fund. Electronics Communications and Computer Science
, vol.E80-A
, Issue.1
, pp. 54-63
-
-
Mambo, M.1
Okamoto, E.2
-
2
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Proceedings of Eurocrypt '98. Volume 1403. (1998) 127-144
-
(1998)
Proceedings of Eurocrypt '98
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
3
-
-
85180411878
-
Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage
-
Full version available at
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. In: the 12th Annual Network and Distributed System Security Symposium. (2005) 29-43 Full version available at http://eprint.iacr.org/2005/028.
-
(2005)
the 12th Annual Network and Distributed System Security Symposium
, pp. 29-43
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
4
-
-
84956869808
-
On quorum controlled asymmetric proxy re-encryption
-
Jakobsson, M.: On quorum controlled asymmetric proxy re-encryption. In: Proceedings of Public Key Cryptography. (1999) 112-121
-
(1999)
Proceedings of Public Key Cryptography
, pp. 112-121
-
-
Jakobsson, M.1
-
6
-
-
84874324906
-
-
Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil Pairing. In: Advances in Cryptology (CRYPTO 2001). 2139 of Lecture Notes in Computer Science., Springer (2001) 213-229
-
Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil Pairing. In: Advances in Cryptology (CRYPTO 2001). Volume 2139 of Lecture Notes in Computer Science., Springer (2001) 213-229
-
-
-
-
7
-
-
77950151506
-
An identity based encryption scheme based on Quadratic Residues
-
Cryptography and Coding, 8th IMA International Conference. of, Springer
-
Cocks, C.: An identity based encryption scheme based on Quadratic Residues. In: Cryptography and Coding, 8th IMA International Conference. Volume 2260 of Lecture Notes in Computer Science., Springer (2001) 360-363
-
(2001)
Lecture Notes in Computer Science
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
8
-
-
0038487086
-
Secret handshakes from pairing-based key agreements
-
Washington, DC, USA, IEEE Computer Society
-
Balfanz, D., Durfee, G., Shankar, N., Smetters, D., Staddon, J., Wong, H.C.: Secret handshakes from pairing-based key agreements. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy (SP '03), Washington, DC, USA, IEEE Computer Society (2003) 180
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy (SP '03)
, pp. 180
-
-
Balfanz, D.1
Durfee, G.2
Shankar, N.3
Smetters, D.4
Staddon, J.5
Wong, H.C.6
-
9
-
-
35048901123
-
Public key encryption with keyword search
-
Advances in Cryptology, EUROCRYPT, of
-
Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Advances in Cryptology - EUROCRYPT 2004. Volume 3027 of Lecture Notes in Computer Science. (2004) 506-522
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
10
-
-
77952589508
-
Building an encrypted and searchable audit log
-
San Diego, CA
-
Waters, B.R., Balfanz, D., Durfee, G., Smetters, D.K.: Building an encrypted and searchable audit log. In: Proceedings of Network and Distributed System Security Symposium 2004 (NDSS'04), San Diego, CA (2004)
-
(2004)
Proceedings of Network and Distributed System Security Symposium 2004 (NDSS'04)
-
-
Waters, B.R.1
Balfanz, D.2
Durfee, G.3
Smetters, D.K.4
-
11
-
-
35048852705
-
Chosen-ciphertext security from Identity Based Encryption
-
Proceedings of Eurocrypt '04. of, Springer-Verlag
-
Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from Identity Based Encryption. In: Proceedings of Eurocrypt '04. Volume 3027 of Lecture Notes in Computer Science., Springer-Verlag (2004) 207-222
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
12
-
-
0037623983
-
Identity-based encryption from the Weil Pairing
-
Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil Pairing. SIAM Journal of Computing 32(3) (2003) 586-615
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
13
-
-
38049047470
-
-
Voltage Security, Inc
-
Voltage Security, Inc. (http://www.voltage.com)
-
-
-
-
14
-
-
12344290414
-
Distributed blinding for ElGamal re-encryption
-
Technical Report 2004-1924, Cornell Computer Science Department
-
Zhou, L., Marsh, M.A., Schneider, F.B., Redz, A.: Distributed blinding for ElGamal re-encryption. Technical Report 2004-1924, Cornell Computer Science Department (2004)
-
(2004)
-
-
Zhou, L.1
Marsh, M.A.2
Schneider, F.B.3
Redz, A.4
-
16
-
-
38049003435
-
-
Boneh, D., Goh, E.J., Matsuo, T.: Proposal for P1363.3 Proxy Re-encryption, (http://grouper.ieee.org/groups/1363/IBC/submissions/ NTTDataProposal-for-P1363.3-2006-09-01.pdf)
-
Boneh, D., Goh, E.J., Matsuo, T.: Proposal for P1363.3 Proxy Re-encryption, (http://grouper.ieee.org/groups/1363/IBC/submissions/ NTTDataProposal-for-P1363.3-2006-09-01.pdf)
-
-
-
-
17
-
-
35048841300
-
Efficient selective-id secure Identity-Based Encryption without random oracles
-
Proceedings of Eurocrypt '04. of, Springer
-
Boneh, D., Boyen, X.: Efficient selective-id secure Identity-Based Encryption without random oracles. In: Proceedings of Eurocrypt '04. Volume 3027 of Lecture Notes in Computer Science., Springer (2004) 223-238
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
18
-
-
24944566040
-
Efficient Identity-Based Encryption without random oracles
-
Proceedings of Eurocrypt '05. of, Springer
-
Waters, B.: Efficient Identity-Based Encryption without random oracles. In: Proceedings of Eurocrypt '05. Volume 3494 of Lecture Notes in Computer Science., Springer (2005) 114-127
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
20
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Proceedings of Crypto '99. 1666 of, Springer
-
Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Proceedings of Crypto '99. Volume 1666 of Lecture Notes in Computer Science., Springer (1999) 537-554
-
(1999)
Lecture Notes in Computer Science
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
21
-
-
33745678280
-
Applying Fujisaki-Okamoto to Identity-Based Encryption
-
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 16th International Symposium AAECC-16, of, Springer
-
Yang, P., Kitagawa, T., Hanaoka, G., Zhang, R., Matsuura, K., Imai, H.: Applying Fujisaki-Okamoto to Identity-Based Encryption. In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 16th International Symposium (AAECC-16). Volume 3857 of Lecture Notes in Computer Science., Springer (2006) 183-192
-
(2006)
Lecture Notes in Computer Science
, vol.3857
, pp. 183-192
-
-
Yang, P.1
Kitagawa, T.2
Hanaoka, G.3
Zhang, R.4
Matsuura, K.5
Imai, H.6
-
22
-
-
70349557354
-
Hierarchical ID-Based cryptography
-
Proceedings of Asiacrypt '02. of, Springer
-
Gentry, C., Silverberg, A.: Hierarchical ID-Based cryptography. In: Proceedings of Asiacrypt '02. Volume 2501 of Lecture Notes in Computer Science., Springer (2002) 548-566
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
23
-
-
84946840347
-
Short signatures from the Weil Pairing
-
ASIACRYPT '01: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. of, London, UK, Springer-Verlag
-
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil Pairing. In: ASIACRYPT '01: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. Volume 2248 of Lecture Notes in Computer Science., London, UK, Springer-Verlag (2001) 514-532
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
24
-
-
38049053962
-
Identity-based proxy re-encryption. Cryptology ePrint Archive
-
Report 2006/473
-
Green, M., Ateniese, G.: Identity-based proxy re-encryption. Cryptology ePrint Archive, Report 2006/473 (2006) http://eprint.iacr.org/2006/473.pdf.
-
(2006)
-
-
Green, M.1
Ateniese, G.2
|