-
1
-
-
38149002625
-
-
Adida, B., Chau, D., Hohenberger, S., Rivest, R.L.: Lightweight signatures for email. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, Springer, Heidelberg (2006)
-
Adida, B., Chau, D., Hohenberger, S., Rivest, R.L.: Lightweight signatures for email. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, Springer, Heidelberg (2006)
-
-
-
-
2
-
-
3042597451
-
Identity-based threshold signature scheme from the bilinear pairings
-
IEEE Computer Society Press, Los Alamitos
-
Baek, J., Zheng, Y.: Identity-based threshold signature scheme from the bilinear pairings. In: ITCC 2004. Proceedings of the International Conference on Information Technology: Coding and Computing, vol. 1, pp. 124-128. IEEE Computer Society Press, Los Alamitos (2004)
-
(2004)
ITCC 2004. Proceedings of the International Conference on Information Technology: Coding and Computing
, vol.1
, pp. 124-128
-
-
Baek, J.1
Zheng, Y.2
-
3
-
-
26444464784
-
-
Bagga, W., Molva, R.: Policy-based cryptography and applications. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, 3570, pp. 72-87. Springer, Heidelberg (2005)
-
Bagga, W., Molva, R.: Policy-based cryptography and applications. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 72-87. Springer, Heidelberg (2005)
-
-
-
-
4
-
-
33646820668
-
Efficient and provably-secure identity-based signatures and signcryption from Bilinear maps
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.: Efficient and provably-secure identity-based signatures and signcryption from Bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515-532. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.4
-
5
-
-
35048876343
-
Security proofs for identity-based identification and signature schemes
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 268-286. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 268-286
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
-
6
-
-
85025838724
-
-
Bellare, M., Neven, G.: Identity-based multi-signatures from RSA. In: Abe, M. (ed.) CT-RSA 2007. LNCS, 4377, pp. 145-162. Springer, Heidelberg (2006)
-
Bellare, M., Neven, G.: Identity-based multi-signatures from RSA. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 145-162. Springer, Heidelberg (2006)
-
-
-
-
7
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Boneh, D., Boyen, X., Goh, E.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.3
-
8
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Biham, E, ed, EUROCRPYT 2003, Springer, Heidelberg
-
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRPYT 2003. LNCS, vol. 2656, pp. 416-432. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
10
-
-
33749573228
-
Anonymous hierarchical identity-based encryption (without random oracles)
-
Dwork, C ed, CRYPTO 2006, Springer, Heidelberg
-
Boyen, X., Waters, B.: Anonymous hierarchical identity-based encryption (without random oracles). In: Dwork, C (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 290-307. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 290-307
-
-
Boyen, X.1
Waters, B.2
-
11
-
-
38149029815
-
A biometric identity based signature scheme
-
Burnett, A., Byrne, F., Dowling, T., Duffy, A.: A biometric identity based signature scheme. International Journal of Network Security 5(3), 317-326 (2007)
-
(2007)
International Journal of Network Security
, vol.5
, Issue.3
, pp. 317-326
-
-
Burnett, A.1
Byrne, F.2
Dowling, T.3
Duffy, A.4
-
12
-
-
35248844436
-
-
Cha, J.C., Cheon, J.H.: An identity-based signature from Gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, 2567, pp. 18-30. Springer, Heidelberg (2002)
-
Cha, J.C., Cheon, J.H.: An identity-based signature from Gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18-30. Springer, Heidelberg (2002)
-
-
-
-
13
-
-
38149011817
-
Role Signatures for Access Control in Grid Computing. Royal Holloway, University of London
-
Technical Report RHUL-MA-2007-2, May
-
Crampton, J., Lim, H.W.: Role Signatures for Access Control in Grid Computing. Royal Holloway, University of London, Technical Report RHUL-MA-2007-2, (May 2007)
-
(2007)
-
-
Crampton, J.1
Lim, H.W.2
-
14
-
-
38349020106
-
A certificate-free grid security infrastructure supporting password-based user authentication
-
Crampton, J., Lim, H.W., Paterson, K.G., Price, G.: A certificate-free grid security infrastructure supporting password-based user authentication. In: Proceedings of the 6th Annual PKI R&D Workshop 2007. NIST Interagency Report (2007)
-
(2007)
Proceedings of the 6th Annual PKI R&D Workshop 2007. NIST Interagency Report
-
-
Crampton, J.1
Lim, H.W.2
Paterson, K.G.3
Price, G.4
-
15
-
-
0035455653
-
The anatomy of the Grid: Enabling scalable virtual organizations
-
Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the Grid: Enabling scalable virtual organizations. International Journal of High Performance Computing Applications 15(3), 200-222 (2001)
-
(2001)
International Journal of High Performance Computing Applications
, vol.15
, Issue.3
, pp. 200-222
-
-
Foster, I.1
Kesselman, C.2
Tuecke, S.3
-
16
-
-
38049084297
-
Pairings for Cryptographers. Cryptology ePrint Archive
-
Report 2006/165 May
-
Galbraith, S.D., Paterson, K.G., Smart, N.P.: Pairings for Cryptographers. Cryptology ePrint Archive, Report 2006/165 (May 2006), http://eprint.iacr.org/2006/165
-
(2006)
-
-
Galbraith, S.D.1
Paterson, K.G.2
Smart, N.P.3
-
17
-
-
77649247458
-
On the generic construction of identity-based signatures with additional properties
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Galindo, D., Herranz, J., Kiltz, E.: On the generic construction of identity-based signatures with additional properties. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 178-193. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 178-193
-
-
Galindo, D.1
Herranz, J.2
Kiltz, E.3
-
18
-
-
33745849655
-
-
Gentry, C., Ramzan, Z.: Identity-based aggregate signatures. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 257-273. Springer, Heidelberg (2006)
-
Gentry, C., Ramzan, Z.: Identity-based aggregate signatures. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 257-273. Springer, Heidelberg (2006)
-
-
-
-
19
-
-
70349557354
-
Hierarchical ID-based cryptography
-
Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
-
Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548-566. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
20
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Wright, R.N, di Vimercati, S.D.C, Shmatikov, V, eds, ACM Press, New York
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Wright, R.N., di Vimercati, S.D.C., Shmatikov, V. (eds.) CCS 2006. Proceedings of the 13th ACM Computer and Communications Security Conference, pp. 89-98. ACM Press, New York (2006)
-
(2006)
CCS 2006. Proceedings of the 13th ACM Computer and Communications Security Conference
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
21
-
-
35248867510
-
-
Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H. (eds.) SAC 2002. LNCS, 2593, pp. 310-324. Springer, Heidelberg (2003)
-
Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H. (eds.) SAC 2002. LNCS, vol. 2593, pp. 310-324. Springer, Heidelberg (2003)
-
-
-
-
22
-
-
84947242701
-
Towards hierarchical identity-based encryption
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
-
Horwitz, J., Lynn, B.: Towards hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 466-481. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
23
-
-
84946844750
-
-
Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS-IV. LNCS, 1838, pp. 385-394. Springer, Heidelberg (2000)
-
Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS-IV. LNCS, vol. 1838, pp. 385-394. Springer, Heidelberg (2000)
-
-
-
-
24
-
-
84943807207
-
Toward secure key distribution in truly adhoc networks
-
IEEE Computer Society Press, Los Alamitos
-
Khalili, A., Katz, J., Arbaugh, W.A.: Toward secure key distribution in truly adhoc networks. In: SAINT 2003. Proceedings of the 2003 Symposium on Applications and the Internet Workshops, pp. 342-346. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
SAINT 2003. Proceedings of the 2003 Symposium on Applications and the Internet Workshops
, pp. 342-346
-
-
Khalili, A.1
Katz, J.2
Arbaugh, W.A.3
-
25
-
-
33746066354
-
Sequential aggregate signatures and multisignatures without random oracles
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Lu, S., Ostrovsky, R., Sahai, A., Shacham, H., Waters, B.: Sequential aggregate signatures and multisignatures without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 465-485. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 465-485
-
-
Lu, S.1
Ostrovsky, R.2
Sahai, A.3
Shacham, H.4
Waters, B.5
-
26
-
-
0037194815
-
ID-based signatures from pairings on elliptic curves
-
Paterson, K.G.: ID-based signatures from pairings on elliptic curves. Electronics Letters 38(18), 1025-1026 (2002)
-
(2002)
Electronics Letters
, vol.38
, Issue.18
, pp. 1025-1026
-
-
Paterson, K.G.1
-
27
-
-
33746372179
-
-
Paterson, K.G., Schuldt, J.C.N.: Efficient identity-based signatures secure in the standard model. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, 4058, pp. 207-222. Springer, Heidelberg (2006)
-
Paterson, K.G., Schuldt, J.C.N.: Efficient identity-based signatures secure in the standard model. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 207-222. Springer, Heidelberg (2006)
-
-
-
-
28
-
-
34547325357
-
Secure attribute-based systems
-
Wright, R.N, di Vimercati, S.D.C, Shmatikov, V, eds, ACM Press, New York
-
Pirretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure attribute-based systems. In: Wright, R.N., di Vimercati, S.D.C., Shmatikov, V. (eds.) CCS 2006. Proceedings of the 13th ACM Computer and Communications Security Conference, pp. 99-112. ACM Press, New York (2006)
-
(2006)
CCS 2006. Proceedings of the 13th ACM Computer and Communications Security Conference
, pp. 99-112
-
-
Pirretti, M.1
Traynor, P.2
McDaniel, P.3
Waters, B.4
-
29
-
-
24944554962
-
Fuzzy identity-based encryption
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
31
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
32
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
33
-
-
35248891001
-
-
Smart, N.P.: Access control using pairing based cryptography. In: Joye, M. (ed.) CT-RSA 2003. LNCS, 2612, pp. 111-121. Springer, Heidelberg (2003)
-
Smart, N.P.: Access control using pairing based cryptography. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 111-121. Springer, Heidelberg (2003)
-
-
-
|