-
1
-
-
35048835319
-
Secure identity based encryption without random oracles
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X.: Secure identity based encryption without random oracles. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 443-459. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
2
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Biham, E, ed, EUROCRPYT 2003, Springer, Heidelberg
-
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRPYT 2003. LNCS, vol. 2656, pp. 416-432. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
4
-
-
84946840347
-
Short signatures from the Weil pairing
-
Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514-532. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
5
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537-554. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
6
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
Biham, E, ed, EUROCRPYT 2003, Springer, Heidelberg
-
Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRPYT 2003. LNCS, vol. 2656, pp. 272-293. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 272-293
-
-
Gentry, C.1
-
7
-
-
0030687206
-
Proxy cryptosystem: Delegation of the power to decrypt ciphertexts
-
Mambo, M., Okamoto, E.: Proxy cryptosystem: delegation of the power to decrypt ciphertexts. IEICE Trans. Fundamentals E80-A(1), 54-63 (1997)
-
(1997)
IEICE Trans. Fundamentals
, vol.E80-A
, Issue.1
, pp. 54-63
-
-
Mambo, M.1
Okamoto, E.2
-
8
-
-
84860368738
-
Delegation decryption
-
Walker, M, ed, IMA, Crypto & Coding, Springer, Heidelberg
-
Mu, Y., Varadharajan, V., Nguyen, K.Q.: Delegation decryption. In: Walker, M. (ed.) IMA - Crypto & Coding 1999. LNCS, vol. 1746, pp. 258-269. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1746
, pp. 258-269
-
-
Mu, Y.1
Varadharajan, V.2
Nguyen, K.Q.3
-
9
-
-
38349015975
-
-
Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing, SCIS2000-C20 (2000)
-
Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing, SCIS2000-C20 (2000)
-
-
-
-
10
-
-
35048854690
-
HEAD: Hybrid encryption with delegated decryption capbility
-
Canteaut, A, Viswanathan, K, eds, INDOCRYPT 2004, Springer, Heidelberg
-
Sarkar, P.: HEAD: hybrid encryption with delegated decryption capbility. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 230-244. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3348
, pp. 230-244
-
-
Sarkar, P.1
-
11
-
-
33744926380
-
Transformation-free proxy cryptosystems and their applications to electronic commerce
-
ACM Press, New York
-
Wang, L., Cao, Z., Okamoto, E., Miao, Y., Okamoto, T.: Transformation-free proxy cryptosystems and their applications to electronic commerce. In: Proceeding of International Conference on Information Security (InfoSecu 2004), pp. 92-98. ACM Press, New York (2004)
-
(2004)
Proceeding of International Conference on Information Security (InfoSecu
, pp. 92-98
-
-
Wang, L.1
Cao, Z.2
Okamoto, E.3
Miao, Y.4
Okamoto, T.5
-
12
-
-
38349010221
-
Authorization-limited transformation-free proxy cryptosystems and their security analyses
-
Wang, L., Cao, Z., Okamoto, T., Miao, Y., Okamoto, E.: Authorization-limited transformation-free proxy cryptosystems and their security analyses. IEICE Trans. Fundamentals E89-A(1), 106-114 (2006)
-
(2006)
IEICE Trans. Fundamentals
, vol.E89-A
, Issue.1
, pp. 106-114
-
-
Wang, L.1
Cao, Z.2
Okamoto, T.3
Miao, Y.4
Okamoto, E.5
-
13
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
14
-
-
33744930359
-
-
Zhou, Y., Cao, Z., Chai, Z.: Constructing secure proxy cryptosystem. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, 3822, pp. 150-161. Springer, Heidelberg (2005)
-
Zhou, Y., Cao, Z., Chai, Z.: Constructing secure proxy cryptosystem. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 150-161. Springer, Heidelberg (2005)
-
-
-
|