-
1
-
-
24944516264
-
-
Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. In: Cramer [16], pp. 128-146
-
Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. In: Cramer [16], pp. 128-146
-
-
-
-
2
-
-
84937428623
-
Efficient Algorithms for PairingBased Cryptosystems
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient Algorithms for PairingBased Cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354-368. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
3
-
-
38149115625
-
Identity based key encapsulation with wildcards. In: Cryptology ePrint Archive
-
Report 2006/377
-
Birkett, J., Dent, A.W., Neven, G., Schuldt, J.: Identity based key encapsulation with wildcards. In: Cryptology ePrint Archive, Report 2006/377 (2006), http://eprint.iacr.org/
-
(2006)
-
-
Birkett, J.1
Dent, A.W.2
Neven, G.3
Schuldt, J.4
-
4
-
-
14844324877
-
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
-
Boneh, D., Boyen, X.: Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In: Cachin and Camenisch [10], pp. 223-238
-
Cachin and Camenisch
, vol.10
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
6
-
-
38149120998
-
-
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer [16], pp. 440-456, Full version available at Cryptology ePrint Archive; Report 2005/015
-
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer [16], pp. 440-456, Full version available at Cryptology ePrint Archive; Report 2005/015
-
-
-
-
7
-
-
33745854208
-
Chosen-Ciphertext Security from Identity-Based Encryption
-
Boneh, D., Canetti, R., Halevi, S., Katz, J.: Chosen-Ciphertext Security from Identity-Based Encryption. SIAM J. of Computing 36(5), 915-942 (2006)
-
(2006)
SIAM J. of Computing
, vol.36
, Issue.5
, pp. 915-942
-
-
Boneh, D.1
Canetti, R.2
Halevi, S.3
Katz, J.4
-
9
-
-
33745767987
-
Direct Chosen Ciphertext Security from Identity-Based Techniques
-
Atluri, V, Meadows, C, Juels, A, eds, ACM Press, New York
-
Boyen, X., Mei, Q., Waters, B.: Direct Chosen Ciphertext Security from Identity-Based Techniques. In: Atluri, V., Meadows, C., Juels, A. (eds.) ACM Conference on Computer and Communications Security, pp. 320-329. ACM Press, New York (2005)
-
(2005)
ACM Conference on Computer and Communications Security
, pp. 320-329
-
-
Boyen, X.1
Mei, Q.2
Waters, B.3
-
10
-
-
38149043682
-
EUROCRYPT 2004
-
Cachin, C, Camenisch, J, eds, Springer, Heidelberg
-
Cachin, C., Camenisch, J. (eds.): EUROCRYPT 2004. LNCS, vol. 3027, pp. 2-6. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 2-6
-
-
-
11
-
-
34547476660
-
Chosen-Ciphertext Security from Identity-Based Encryption
-
Canetti, R., Halevi, S., Katz, J.: Chosen-Ciphertext Security from Identity-Based Encryption. In: Cachin and Camenisch [10], pp. 207-222.
-
Cachin and Camenisch
, vol.10
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
12
-
-
33845925071
-
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
-
Lipmaa, H, Yung, M, Lin, D, eds, Inscrypt 2006, Springer, Heidelberg
-
Chakraborty, D., Sarkar, P.: A General Construction of Tweakable Block Ciphers and Different Modes of Operations. In: Lipmaa, H., Yung, M., Lin, D. (eds.) Inscrypt 2006. LNCS, vol. 4318, pp. 88-102. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4318
, pp. 88-102
-
-
Chakraborty, D.1
Sarkar, P.2
-
13
-
-
33745840439
-
Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model
-
Won, D.H, Kim, S, eds, ICISC 2005, Springer, Heidelberg
-
Chatterjee, S., Sarkar, P.: Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 424-440. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3935
, pp. 424-440
-
-
Chatterjee, S.1
Sarkar, P.2
-
14
-
-
77649262307
-
HIBE with Short Public Parameters Without Random Oracle
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Chatterjee, S., Sarkar, P.: HIBE with Short Public Parameters Without Random Oracle. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 145-160. Springer, Heidelberg (2006), http://eprint.iacr.org/
-
(2006)
LNCS
, vol.4284
, pp. 145-160
-
-
Chatterjee, S.1
Sarkar, P.2
-
15
-
-
34547456130
-
New Constructions of Constant Size Ciphertext HIBE Without Random Oracle
-
Rhee, M.S, Lee, B, eds, ICISC 2006, Springer, Heidelberg
-
Chatterjee, S., Sarkar, P.: New Constructions of Constant Size Ciphertext HIBE Without Random Oracle. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 310-327. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4296
, pp. 310-327
-
-
Chatterjee, S.1
Sarkar, P.2
-
16
-
-
38049111724
-
EUROCRYPT 2005
-
Cramer, R, ed, Springer, Heidelberg
-
Cramer, R. (ed.): EUROCRYPT 2005. LNCS, vol. 3494. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
-
-
-
17
-
-
38149013275
-
CRYPTO 2004
-
Franklin, M, ed, Springer, Heidelberg
-
Franklin, M. (ed.): CRYPTO 2004. LNCS, vol. 3152, pp. 15-19. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 15-19
-
-
-
18
-
-
82955246861
-
Implementing the Tate Pairing
-
Fieker, C, Kohel, D.R, eds, Algorithmic Number Theory, Springer, Heidelberg
-
Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the Tate Pairing. In: Fieker, C., Kohel, D.R. (eds.) Algorithmic Number Theory. LNCS, vol. 2369, pp. 324-337. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2369
, pp. 324-337
-
-
Galbraith, S.D.1
Harrison, K.2
Soldera, D.3
-
19
-
-
70349557354
-
Hierarchical ID-Based Cryptography
-
Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
-
Gentry, C., Silverberg, A.: Hierarchical ID-Based Cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548-566. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
20
-
-
84958968987
-
-
Gligor, V.D., Donescu, P.: Fast encryption and authentication: XCBC encryption and XECB authentication modes. In: Matsui, M. (ed.) FSE 2001. LNCS, 2355, pp. 92-108. Springer, Heidelberg (2002)
-
Gligor, V.D., Donescu, P.: Fast encryption and authentication: XCBC encryption and XECB authentication modes. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 92-108. Springer, Heidelberg (2002)
-
-
-
-
21
-
-
84947242701
-
Toward Hierarchical Identity-Based Encryption
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
-
Horwitz, J., Lynn, B.: Toward Hierarchical Identity-Based Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 466-481. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
22
-
-
84945137421
-
Encryption Modes with Almost Free Message Integrity
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Jutla, C.S.: Encryption Modes with Almost Free Message Integrity. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 529-544. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 529-544
-
-
Jutla, C.S.1
-
23
-
-
38049004199
-
Chosen-ciphertext secure identity-based encryption in the standard model with short ciphertexts. In: Cryptology ePrint Archive
-
Report 2006/122
-
Kiltz, E.: Chosen-ciphertext secure identity-based encryption in the standard model with short ciphertexts. In: Cryptology ePrint Archive, Report 2006/122 (2006), http://eprint.iacr.org/
-
(2006)
-
-
Kiltz, E.1
-
24
-
-
33746324862
-
-
Kiltz, E., Galindo, D.: Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, 4058, pp. 336-347. Springer, Heidelberg (2006), full version available at http://eprint.iacr.org/2006/034
-
Kiltz, E., Galindo, D.: Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 336-347. Springer, Heidelberg (2006), full version available at http://eprint.iacr.org/2006/034
-
-
-
-
26
-
-
33749549619
-
Secure and Practical Identity-Based Encryption. Cryptology ePrint Archive
-
Report 2005/369
-
Naccache, D.: Secure and Practical Identity-Based Encryption. Cryptology ePrint Archive, Report 2005/369 (2005) http://eprint.iacr.org/
-
(2005)
-
-
Naccache, D.1
-
27
-
-
33644958567
-
-
Rogaway, P.: Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, 3329, pp. 16-31. Springer, Heidelberg (2004)
-
Rogaway, P.: Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 16-31. Springer, Heidelberg (2004)
-
-
-
-
28
-
-
38149093531
-
Construction of a hybrid hierarchical identity based encryption protocol secure against adaptive attacks (without random oracle). Cryptology ePrint Archive
-
Report 2006/362
-
Sarkar, P., Chatterjee, S.: Construction of a hybrid hierarchical identity based encryption protocol secure against adaptive attacks (without random oracle). Cryptology ePrint Archive, Report 2006/362 (2006), http://eprint.iacr.org/
-
(2006)
-
-
Sarkar, P.1
Chatterjee, S.2
-
29
-
-
85020598353
-
Identity-Based Cryptosystems and Signature Schemes
-
Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
-
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
30
-
-
38149002469
-
-
Shoup, V, A proposal for an ISO standard for public key encryption version 2.1, December 20, 2001, available from
-
Shoup, V.: A proposal for an ISO standard for public key encryption (version 2.1), (December 20, 2001), available from http://www.shoup.net/papers/
-
-
-
|