-
2
-
-
0345490607
-
Certificateless public key cryptography
-
Laih, C.-S, ed, ASIACRYPT 2003, Springer, Heidelberg
-
Al-Riyami, S.S., Paterson, K.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452-473. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.2
-
3
-
-
24144438230
-
-
Al-Riyami, S.S., Paterson, K.: CBE from CL-PKE: A generic construction and efficient schems. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 398-415. Springer, Heidelberg (2005)
-
Al-Riyami, S.S., Paterson, K.: CBE from CL-PKE: A generic construction and efficient schems. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 398-415. Springer, Heidelberg (2005)
-
-
-
-
4
-
-
33645958856
-
-
Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, 3650, pp. 134-148. Springer, Heidelberg (2005)
-
Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 134-148. Springer, Heidelberg (2005)
-
-
-
-
5
-
-
35048832490
-
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Bellarre, M., Boldyreva, A., Palacio, A., An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem, In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004, LNCS, vol. 3027, pp. 171-188. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 171-188
-
-
Bellarre, M.1
Boldyreva, A.2
Palacio, A.3
-
6
-
-
33745854208
-
Chosen ciphertext secuirty from identity-based encryption
-
Boneh, D., Canetti, R., Halevi, S., Katz, J.: Chosen ciphertext secuirty from identity-based encryption. SIAM J. COMPUT 36(5), 1301-1328 (2006)
-
(2006)
SIAM J. COMPUT
, vol.36
, Issue.5
, pp. 1301-1328
-
-
Boneh, D.1
Canetti, R.2
Halevi, S.3
Katz, J.4
-
7
-
-
33645751082
-
Generic construction of identity-based and certificateless KEMs. Cryptology ePrint Archive
-
Report 2005/058
-
Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic construction of identity-based and certificateless KEMs. Cryptology ePrint Archive, Report 2005/058 (2005) http://eprint.iacr.org/2005/058
-
(2005)
-
-
Bentahar, K.1
Farshim, P.2
Malone-Lee, J.3
Smart, N.P.4
-
8
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracles
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient selective-ID secure identity based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223 238. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
9
-
-
35048848152
-
Short signatures without random oracles
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004, LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
10
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213 229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
11
-
-
0031619016
-
The random oracle methodology, revisited
-
Canetti, C., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. In: Proceedings of the thirtieth anual ACM symposium on Theory of Computing, pp. 209-218 (1998)
-
(1998)
Proceedings of the thirtieth anual ACM symposium on Theory of Computing
, pp. 209-218
-
-
Canetti, C.1
Goldreich, O.2
Halevi, S.3
-
12
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
Biham, E, ed, Advances in Cryptology-EUROCRPYT 2003, Springer, Heidelberg
-
Canetti, C., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. In: Biham, E. (ed.) Advances in Cryptology-EUROCRPYT 2003. LNCS, vol. 2656, pp. 255-271. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 255-271
-
-
Canetti, C.1
Halevi, S.2
Katz, J.3
-
13
-
-
35048852705
-
Chosen ciphertext security from identity-based encryption
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Canetti, C., Halevi, S., Katz, J.: Chosen ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, C.1
Halevi, S.2
Katz, J.3
-
14
-
-
33744808601
-
Efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/012
-
Cheng, Z., Comley, R.: Efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/012 (2005) http://eprint.iacr.org/2005/ 012
-
-
-
Cheng, Z.1
Comley, R.2
-
15
-
-
84870707379
-
-
Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attacks. In: Krawczyk, H. (ed.) CRYF'TO 1998. LNCS, 1462, pp. 13-25. Springer, Heidelberg (1998)
-
Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attacks. In: Krawczyk, H. (ed.) CRYF'TO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
-
-
-
-
16
-
-
38149141898
-
A survey of certificateless encryption schemes and security models. Cryptology ePrint Archive
-
Report 2006/211
-
Dent, A.W.: A survey of certificateless encryption schemes and security models. Cryptology ePrint Archive, Report 2006/211 (2006) http://eprint.iacr. org/2006/211
-
(2006)
-
-
Dent, A.W.1
-
17
-
-
24144468589
-
-
Dodis, Y., Katz, J.: Chosen-ciphertext security of mutiple encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 188-209. Springer, Heidelberg (2005)
-
Dodis, Y., Katz, J.: Chosen-ciphertext security of mutiple encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 188-209. Springer, Heidelberg (2005)
-
-
-
-
18
-
-
33746324862
-
-
Galindo, D., Kiltz, E.: Direct chosen ciphertext secure identity-based key encapsulation without random oracles. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, 4058, pp. 336-347. Springer, Heidelberg (2006)
-
Galindo, D., Kiltz, E.: Direct chosen ciphertext secure identity-based key encapsulation without random oracles. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 336-347. Springer, Heidelberg (2006)
-
-
-
-
19
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
Biham, E, ed, Advances in Cryptology, EUROCRPYT 2003, Springer, Heidelberg
-
Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) Advances in Cryptology - EUROCRPYT 2003. LNCS, vol. 2656, pp. 272-293. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 272-293
-
-
Gentry, C.1
-
20
-
-
33746062799
-
Practical Identity-Based Encryption Without Random Oracles
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Gentry, C.: Practical Identity-Based Encryption Without Random Oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445-464, Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 445-464
-
-
Gentry, C.1
-
21
-
-
32844456747
-
-
Goldwasser, S., Tauman, Y.: On the (In)security of the Fiat-Shamir Paradigm. In: FOC'03, pp. 102-115. IEEE Computer Society Press, Los Alamitos (2003)
-
Goldwasser, S., Tauman, Y.: On the (In)security of the Fiat-Shamir Paradigm. In: FOC'03, pp. 102-115. IEEE Computer Society Press, Los Alamitos (2003)
-
-
-
-
22
-
-
38049004199
-
Chosen ciphertext secure identity-based encryption in the standard model with short ciphertexts. Cryptology ePrint Archive
-
Report 2006/122
-
Kiltz, E.: Chosen ciphertext secure identity-based encryption in the standard model with short ciphertexts. Cryptology ePrint Archive, Report 2006/122 (2006) http://eprint.iacr.org/2006/122
-
(2006)
-
-
Kiltz, E.1
-
23
-
-
84876341103
-
Self-generated-certificate public key cryptography and certificateless signature / encryption scheme in the standard model
-
To appear
-
Liu, J.K., Au, M.H., Susilo, W.: Self-generated-certificate public key cryptography and certificateless signature / encryption scheme in the standard model. In: ACM AsiaCCS'07 (To appear)
-
ACM AsiaCCS'07
-
-
Liu, J.K.1
Au, M.H.2
Susilo, W.3
-
24
-
-
33745833916
-
-
Libert, B., Quisquater, J.J.: On construction certificateless cryptosystems from identity based encryption. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 474-490. Springer, Heidelberg (2006)
-
Libert, B., Quisquater, J.J.: On construction certificateless cryptosystems from identity based encryption. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 474-490. Springer, Heidelberg (2006)
-
-
-
-
25
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
26
-
-
33645584388
-
Generic construction of certificateless encryption
-
Lagana, A, Gavrilova, M, Kumar, V, Mun, Y, Tan, C.J.K, Gervasi, O, eds, ICCSA 2004, Springer, Heidelberg
-
Yum, D.H., Lee, P. J.: Generic construction of certificateless encryption. In: Lagana, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004, LNCS, vol. 3043, pp. 802-811. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3043
, pp. 802-811
-
-
Yum, D.H.1
Lee, P.J.2
-
27
-
-
33645601534
-
-
Yum, D.H., Lee, P.J.: Identity-based cryptography in public key management. In: Katsikas, S.K., Gritzalis, S., Lopez, J. (eds.) EuroPKI 2004. LNCS, 3093, pp. 71-84. Springer, Heidelberg (2004)
-
Yum, D.H., Lee, P.J.: Identity-based cryptography in public key management. In: Katsikas, S.K., Gritzalis, S., Lopez, J. (eds.) EuroPKI 2004. LNCS, vol. 3093, pp. 71-84. Springer, Heidelberg (2004)
-
-
-
|