-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakley, G.R., Chaum, D., ' ', Santa Barbara, CA, USA, August, 19-23, LNCS
-
Shamir, A.: Blakley, G.R., Chaum, D., ' Identity-based cryptosystems and signature schemes ', Advances in Cryptology - CRYPTO'84, Santa Barbara, CA, USA, August, 19-23, 1985, 196, p. 47-53, LNCS
-
(1985)
Advances in Cryptology - CRYPTO'84
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
2642549675
-
Cryptosystems based on pairing
-
' ', Okinawa, Japan, January
-
Sakai, R., Ohgishi, K., and Kasahara, M.: ' Cryptosystems based on pairing ', SCIS 2000, Okinawa, Japan, January, 2000
-
(2000)
SCIS 2000
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
3
-
-
0037623983
-
Identity based encryption from the Weil pairing
-
' ', (), 0097-5397
-
Boneh, D., and Franklin, M.K.: ' Identity based encryption from the Weil pairing ', SIAM J. Comput., 2003, 32, (3), p. 586-615 0097-5397
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
4
-
-
84947242701
-
Toward hierarchical identity-based encryption
-
Knudsen, L.R., ' ', Amsterdam, The Netherlands, 28 April-2 May, LNCS
-
Horwitz, J., and Lynn, B.: Knudsen, L.R., ' Toward hierarchical identity-based encryption ', Advances in Cryptology - EUROCRYPT 2002, Amsterdam, The Netherlands, 28 April-2 May, 2002, 2332, p. 466-481, LNCS
-
(2002)
Advances in Cryptology - EUROCRYPT 2002
, vol.2332
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
5
-
-
70349557354
-
Hierarchical ID-based cryptography
-
Zheng, Y., ' ', Queenstown, New Zealand, December, 1-5, LNCS
-
Gentry, C., and Silverberg, A.: Zheng, Y., ' Hierarchical ID-based cryptography ', Advances in Cryptology - ASIACRYPT 2002, Queenstown, New Zealand, December, 1-5, 2002, 2501, p. 548-566, LNCS
-
(2002)
Advances in Cryptology - ASIACRYPT 2002
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
6
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Cramer, R., ' ', Aarhus, Denmark, May, 22-6, LNCS
-
Boneh, D., Boyen, X., and Goh, E.-J.: Cramer, R., ' Hierarchical identity based encryption with constant size ciphertext ', Advances in Cryptology - EUROCRYPT 2005, Aarhus, Denmark, May, 22-6, 2005, 3494, p. 440-456, LNCS
-
(2005)
Advances in Cryptology - EUROCRYPT 2005
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
7
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracles
-
Cachin, C., Camenisch, J., ' ', Interlaken, Switzerland, May, 2-6, LNCS
-
Boneh, D., and Boyen, X.: Cachin, C., Camenisch, J., ' Efficient selective-ID secure identity based encryption without random oracles ', Advances in cryptology - EUROCRYPT 2004, Interlaken, Switzerland, May, 2-6, 2004, 3027, p. 223-238, LNCS
-
(2004)
Advances in Cryptology - EUROCRYPT 2004
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
8
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Cramer, R., ' ', Aarhus, Denmark, May, 22-26, LNCS
-
Waters, B.R.: Cramer, R., ' Efficient identity-based encryption without random oracles ', Advances in Cryptology - EUROCRYPT 2005, Aarhus, Denmark, May, 22-26, 2005, 3494, p. 114-127, LNCS
-
(2005)
Advances in Cryptology - EUROCRYPT 2005
, vol.3494
, pp. 114-127
-
-
Waters, B.R.1
-
9
-
-
84979291225
-
Broadcast encryption
-
Stinson, D.R., ' ', Santa Barbara, CA, USA, August, 22-26, LNCS
-
Fiat, A., and Naor, M.: Stinson, D.R., ' Broadcast encryption ', Advances in Cryptology - CRYPTO'93, Santa Barbara, CA, USA, August, 22-26, 1994, 773, p. 480-491, LNCS
-
(1994)
Advances in Cryptology - CRYPTO'93
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
10
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Shoup, V., ' ', Santa Barbara, CA, USA, August, 14-18, LNCS
-
Boneh, D., Gentry, C., and Waters, B.: Shoup, V., ' Collusion resistant broadcast encryption with short ciphertexts and private keys ', Advances in Cryptology - CRYPTO 2005, Santa Barbara, CA, USA, August, 14-18, 2005, 3621, p. 258-275, LNCS
-
(2005)
Advances in Cryptology - CRYPTO 2005
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
11
-
-
33746332056
-
Identity-based encryption gone wild
-
Bugliesi, M., Preneel, B., Sassone, V., Wegener, I., ' ', July, 9-16, LNCS
-
Abdalla, M., Catalano, D., Dent, A., Malone-Lee, J., Neven, G., and Smart, N.: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I., ' Identity-based encryption gone wild ', ICALP 2006: 33rd Int. Colloquium on Automata, Languages and Programming, Part II, July, 9-16, 2006, 4052, p. 300-311, LNCS
-
(2006)
ICALP 2006: 33rd Int. Colloquium on Automata, Languages and Programming, Part II
, vol.4052
, pp. 300-311
-
-
Abdalla, M.1
Catalano, D.2
Dent, A.3
Malone-Lee, J.4
Neven, G.5
Smart, N.6
-
12
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
' ', (available as Cryptology ePrint Archive Report 2006/309)
-
Goyal, V., Pandey, O., Sahai, A., and Waters, B.: ' Attribute-based encryption for fine-grained access control of encrypted data ', ACM CCS 06: 13th Conf. Computer and Communications Security, 2006, (available as Cryptology ePrint Archive Report 2006/309)
-
(2006)
ACM CCS 06: 13th Conf. Computer and Communications Security
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
13
-
-
35248901924
-
Public key broadcast encryption for stateless receivers
-
' ', LNCS
-
Dodis, Y., and Fazio, N.: ' Public key broadcast encryption for stateless receivers ', in Digital Rights Management Workshop, 2696, p. 61-80, LNCS
-
In Digital Rights Management Workshop
, vol.2696
, pp. 61-80
-
-
Dodis, Y.1
Fazio, N.2
-
14
-
-
85025586099
-
Multi-receiver identity-based key encapsulation with shortened ciphertext
-
Barua, R., Lange, T., ' ', Kolkata, India, December, 11-13, LNCS
-
Chatterjee, S., and Sarkar, P.: Barua, R., Lange, T., ' Multi-receiver identity-based key encapsulation with shortened ciphertext ', Progress in Cryptology - INDOCRYPT 2006, Kolkata, India, December, 11-13, 2006, 4329, p. 394-408, LNCS
-
(2006)
Progress in Cryptology - INDOCRYPT 2006
, vol.4329
, pp. 394-408
-
-
Chatterjee, S.1
Sarkar, P.2
-
16
-
-
38049061158
-
Generalized key delegation for hierarchical identity-based encryption
-
' '
-
Abdalla, M., Kiltz, E., and Neven, G.: ' Generalized key delegation for hierarchical identity-based encryption ', ESORICS, 2007, p. 139-154
-
(2007)
ESORICS
, pp. 139-154
-
-
Abdalla, M.1
Kiltz, E.2
Neven, G.3
-
17
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Fairfax, VA, USA, November, 3-5
-
Bellare, M., and Rogaway, P.: ' Random oracles are practical: a paradigm for designing efficient protocols ', ACM CCS 93: 1st Conf. Computer and Communications Security, Fairfax, VA, USA, November, 3-5, 1993, p. 62-73
-
(1993)
ACM CCS 93: 1st Conf. Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
19
-
-
84944905011
-
Homomorphic signature schemes
-
Preneel, B., ' ', San Jose, CA, USA, February, 18-22, LNCS
-
Johnson, R., Molnar, D., Song, X.D., and Wagner, D.: Preneel, B., ' Homomorphic signature schemes ', Topics in Cryptology - CT-RSA 2002, San Jose, CA, USA, February, 18-22, 2002, 2271, p. 244-262, LNCS
-
(2002)
Topics in Cryptology - CT-RSA 2002
, vol.2271
, pp. 244-262
-
-
Johnson, R.1
Molnar, D.2
Song, X.D.3
Wagner, D.4
-
20
-
-
20544455127
-
Transitive signatures: New schemes and proofs
-
0018-9448
-
Bellare, M., and Neven, G.: ' Transitive signatures: new schemes and proofs ', IEEE Trans. Inf. Theory, 2005, 51, (6), p. 2133-2151 0018-9448
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.6
, pp. 2133-2151
-
-
Bellare, M.1
Neven, G.2
-
21
-
-
26444461469
-
Append-only signatures
-
Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M., ' ', Lisbon, Portugal, July, 11-15, LNCS
-
Kiltz, E., Mityagin, A., Panjwani, S., and Raghavan, B.: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M., ' Append-only signatures ', ICALP 2005: 32nd Int. Colloquium on Automata, Languages and Programming, Lisbon, Portugal, July, 11-15, 2005, 3580, p. 434-445, LNCS
-
(2005)
ICALP 2005: 32nd Int. Colloquium on Automata, Languages and Programming
, vol.3580
, pp. 434-445
-
-
Kiltz, E.1
Mityagin, A.2
Panjwani, S.3
Raghavan, B.4
|