-
1
-
-
0003900676
-
Internet x.509 public key infrastructure: Certificate management protocols
-
Work in progress
-
C. Adams and S. Farrell. Internet x.509 public key infrastructure: Certificate management protocols. Work in progress, 2004.
-
(2004)
-
-
Adams, C.1
Farrell, S.2
-
2
-
-
0345490607
-
Certificateless public key cryptography
-
ASIACRYPT, of, Springer-Verlag
-
S. Al-Riyami and K. G. Paterson. Certificateless public key cryptography. In ASIACRYPT, volume 2894 of LNCS, pages 452-473. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.1
Paterson, K.G.2
-
3
-
-
33645958856
-
Certificateless public key encryption without pairing
-
Information Security ISC, of, Springer-Verlag
-
J. Baek, R. Safavi-Naini, and W. Susilo. Certificateless public key encryption without pairing. In Information Security (ISC), volume 3650 of LNCS, pages 134-148. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3650
, pp. 134-148
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
4
-
-
80052994578
-
Multi-recipient encryption schemes: Security notions and randomness re-use
-
Springer-Verlag
-
M. Bellare, A. Boldyreva, and J. Staddon. Multi-recipient encryption schemes: Security notions and randomness re-use. In Public-Key Cryptography (PKC), volume 2567. Springer-Verlag, 2003.
-
(2003)
Public-Key Cryptography (PKC)
, vol.2567
-
-
Bellare, M.1
Boldyreva, A.2
Staddon, J.3
-
7
-
-
33645751082
-
Cryptology ePrint Archive, Report 2005/058
-
K. Bentahar, P. Farshim, J. Malone-Lee, and N.P. Smart. Generic constructions of identity-based and certificateless kerns. Cryptology ePrint Archive, Report 2005/058., 2005.
-
(2005)
-
-
Bentahar, K.1
Farshim, P.2
Malone-Lee, J.3
Smart, N.P.4
-
9
-
-
35248880074
-
Threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman-group signature scheme
-
A. Boldyreva. Threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman-group signature scheme. In Public Key Cryptography (PKC) '03, pages 31-46, 2003.
-
(2003)
Public Key Cryptography (PKC) '03
, pp. 31-46
-
-
Boldyreva, A.1
-
10
-
-
38049077890
-
A closer look at PKI: Security and efficiency
-
paper. Available at
-
A. Boldyreva, M. Fischlin, A. Palacio, and B. Warinschi. A closer look at PKI: Security and efficiency. A full version of this paper. Available at http://www-static.cc.gatech.edu/~aboldyre/publications.html, 2007.
-
(2007)
A full version of this
-
-
Boldyreva, A.1
Fischlin, M.2
Palacio, A.3
Warinschi, B.4
-
11
-
-
11244339991
-
Cryptology ePrint Archive, Report 2003/096
-
A. Boldyreva, A. Palacio, and B. Warinschi. Secure proxy signaure schemes for delegation of signing rights. Cryptology ePrint Archive, Report 2003/096., 2003.
-
(2003)
-
-
Boldyreva, A.1
Palacio, A.2
Warinschi, B.3
-
12
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
CRYPTO, of, Springer-Verlag
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In CRYPTO, volume 2139 of LNCS. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
-
-
Boneh, D.1
Franklin, M.2
-
14
-
-
0345872645
-
Trust and security: A new look at the Byzantine generals problem
-
R. N. Wright and P. G. Neumann, editors, AMS
-
M. Burmester, Y. Desmedt, and G. Kabatianskii. Trust and security: A new look at the Byzantine generals problem. In R. N. Wright and P. G. Neumann, editors, Network Threats, DIMACS, Series in Discrete Mathematics and Theoretical Computer Science, 1996, vol. 38. AMS, 1998.
-
(1998)
Network Threats, DIMACS, Series in Discrete Mathematics and Theoretical Computer Science, 1996
, vol.38
-
-
Burmester, M.1
Desmedt, Y.2
Kabatianskii, G.3
-
15
-
-
4944266340
-
Universally composable signature, certification, and authentication
-
IEEE Computer Society
-
R. Canetti. Universally composable signature, certification, and authentication. In CSFW. IEEE Computer Society, 2004.
-
(2004)
CSFW
-
-
Canetti, R.1
-
16
-
-
35048855095
-
Secret handshakes from CAoblivious encryption
-
ASIACRYPT, of, Springer-Verlag
-
C. Castelluccia, S. Jarecki, and G. Tsudik. Secret handshakes from CAoblivious encryption. In ASIACRYPT, volume 3329 of LNCS, pages 293-307. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3329
, pp. 293-307
-
-
Castelluccia, C.1
Jarecki, S.2
Tsudik, G.3
-
17
-
-
33744808601
-
Cryptology ePrint Archive, Report 2005/012
-
Z. Cheng and R. Comley. Efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/012., 2005.
-
(2005)
-
-
Cheng, Z.1
Comley, R.2
-
18
-
-
38049066662
-
Cryptology ePrint Archive, Report 2005/348
-
A. W. Dent and C. Kudla. On proofs of security for certificateless cryptosystems. Cryptology ePrint Archive, Report 2005/348., 2005.
-
(2005)
-
-
Dent, A.W.1
Kudla, C.2
-
19
-
-
84874800178
-
A public key cryptosystem and signature scheme based on discrete logarithms
-
T. ElGamal. A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, Vol. 31, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
-
-
ElGamal, T.1
-
20
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
CRYPTO, of
-
E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In CRYPTO, volume 1666 of LNCS, pages 537-554, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
21
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
EUROCRYPT, of, Springer-Verlag
-
C. Gentry. Certificate-based encryption and the certificate revocation problem. In EUROCRYPT, volume 2656 of LNCS, pages 272-293. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 272-293
-
-
Gentry, C.1
-
23
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April
-
S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, 17(2):281-308, April 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
24
-
-
35248848005
-
Plaintext awareness via key registration
-
Springer-Verlag
-
J. Herzog, M. Liskov, and S. Micali. Plaintext awareness via key registration. In CRYPTO, volume 2729. Springer-Verlag, 2003.
-
(2003)
CRYPTO
, vol.2729
-
-
Herzog, J.1
Liskov, M.2
Micali, S.3
-
25
-
-
33746370456
-
Key replacement attack against a generic construction of certificateless signature
-
Springer-Verlag
-
B. Hu, D. Wong, Z. Zhang, and X. Deng. Key replacement attack against a generic construction of certificateless signature. In ACISP, volume 4058 of LNCS, pages 235-246. Springer-Verlag, 2006.
-
(2006)
ACISP, volume 4058 of LNCS
, pp. 235-246
-
-
Hu, B.1
Wong, D.2
Zhang, Z.3
Deng, X.4
-
28
-
-
0010567510
-
Proxy signatures, revisited
-
Springer-Verlag
-
S. Kim, S. Park, and D. Won. Proxy signatures, revisited. In ICICS. Springer-Verlag, 1997.
-
(1997)
ICICS
-
-
Kim, S.1
Park, S.2
Won, D.3
-
29
-
-
84974698157
-
Self-certified signatures
-
Indocrypt, of, Springer-Verlag
-
B. Lee and K. Kim. Self-certified signatures. In Indocrypt, volume 2551 of LNCS. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2551
-
-
Lee, B.1
Kim, K.2
-
30
-
-
33749383760
-
Cryptology ePrint Archive, Report 2004/150
-
Y.-R. Lee and H.-S. Lee. An authenticated certificateless public key encryption scheme. Cryptology ePrint Archive, Report 2004/150., 2004.
-
(2004)
-
-
Lee, Y.-R.1
Lee, H.-S.2
-
31
-
-
33745833916
-
On Constructing Certificateless Cryptosystems from Identity Based Encryption
-
Public Key Cryptography PKC, Springer-Verlag
-
B. Libert and J.-J. Quisquater. On Constructing Certificateless Cryptosystems from Identity Based Encryption. In Public Key Cryptography (PKC), LNCS. Springer-Verlag, 2006.
-
(2006)
LNCS
-
-
Libert, B.1
Quisquater, J.-J.2
-
32
-
-
67651053584
-
Pseudonym systems
-
Springer-Verlag
-
A. Lysyanskaya, R. L. Rivest, A. Sahai, and S. Wolf. Pseudonym systems. In Selected Areas in Cryptography (SAC), pages 184-199. Springer-Verlag, 1999.
-
(1999)
Selected Areas in Cryptography (SAC)
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
Wolf, S.4
-
33
-
-
84947294004
-
Modeling public-key infrastructure
-
Springer-Verlag
-
U. Maurer. Modeling public-key infrastructure. In Computer Security - ESORICS 96, pages 325-350. Springer-Verlag, 1996.
-
(1996)
Computer Security - ESORICS 96
, pp. 325-350
-
-
Maurer, U.1
-
35
-
-
3843066626
-
Security of signature schemes in a multi-user setting
-
A. Menezes and N. Smart. Security of signature schemes in a multi-user setting. Designs, Codes and Cryptography, 33:261-274, 2004.
-
(2004)
Designs, Codes and Cryptography
, vol.33
, pp. 261-274
-
-
Menezes, A.1
Smart, N.2
-
38
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4(3):161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
39
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
Springer-Verlag
-
A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO. Springer-Verlag, 1984.
-
(1984)
CRYPTO
-
-
Shamir, A.1
-
40
-
-
38049036156
-
Cryptology ePrint Archive, Report 2005/287
-
Y. Shi and J. Li. Provable efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/287., 2005.
-
(2005)
-
-
Shi, Y.1
Li, J.2
-
41
-
-
3042666549
-
On formal models for secure key exchange
-
3120
-
V. Shoup. On formal models for secure key exchange. IBM Research Report RZ 3120, 1999.
-
(1999)
IBM Research Report RZ
-
-
Shoup, V.1
-
42
-
-
33645584388
-
Generic construction of certificateless encryption
-
EuroPKI, of, Springer-Verlag
-
D. H. Yum and P. J. Lee. Generic construction of certificateless encryption. In EuroPKI, volume 3043 of LNCS, pages 802-811. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3043
, pp. 802-811
-
-
Yum, D.H.1
Lee, P.J.2
-
43
-
-
35048832495
-
Generic construction of certificateless signature
-
Springer-Verlag
-
D. H. Yum and P. J. Lee. Generic construction of certificateless signature. In ACISP, volume 3108 of LNCS, pages 200-211. Springer-Verlag, 2004.
-
(2004)
ACISP, volume 3108 of LNCS
, pp. 200-211
-
-
Yum, D.H.1
Lee, P.J.2
|