-
1
-
-
34748851940
-
New constructions of fuzzy identity-based encryption
-
ASI-ACCS, ACM
-
J. Baek, W. Susilo, and J. Zhou, "New constructions of fuzzy identity-based encryption," in ACM Symposium on Information, Computer and Communications Security (ASI-ACCS 2007), ACM, 2007, pp. 368-370.
-
(2007)
ACM Symposium on Information, Computer and Communications Security
, pp. 368-370
-
-
Baek, J.1
Susilo, W.2
Zhou, J.3
-
2
-
-
35048876343
-
Security Proofs for Identity-Based Identification and Signature Schemes
-
Advances in Cryptology-EUROCRYPT2004, Springer
-
M. Bellare, C. Namprempre, and G. Neven, "Security Proofs for Identity-Based Identification and Signature Schemes," in Advances in Cryptology-EUROCRYPT2004, LNCS 3027, Springer, 2004, pp. 268-286.
-
(2004)
LNCS
, vol.3027
, pp. 268-286
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
-
3
-
-
0037623983
-
Identity-Based Encryption from the Weil Pairing
-
D. Boneh and M. K. Franklin, "Identity-Based Encryption from the Weil Pairing," SIAM J. Comput., vol.32, pp. 586-615, 2003.
-
(2003)
SIAM J. Comput
, vol.32
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
4
-
-
38149029815
-
A Biomet-ric Identity Based Signature Scheme
-
A. Burnett, F. Byrne, T. Dowling, and A. Duffy, "A Biomet-ric Identity Based Signature Scheme," International Journal of Network Security, vol.5, pp. 317-326, 2007.
-
(2007)
International Journal of Network Security
, vol.5
, pp. 317-326
-
-
Burnett, A.1
Byrne, F.2
Dowling, T.3
Duffy, A.4
-
5
-
-
48649088535
-
-
C. Chen, R. N. J. Veldhuis, T. A. M. Kevenaar, and A. H. M. Akkermans, Multi-bits biometric string generation based on the likelyhood ratio, IEEE conference on Biometrics: Theory, Applications and Systems, 2007, pp. 1-6.
-
C. Chen, R. N. J. Veldhuis, T. A. M. Kevenaar, and A. H. M. Akkermans, "Multi-bits biometric string generation based on the likelyhood ratio," IEEE conference on Biometrics: Theory, Applications and Systems, 2007, pp. 1-6.
-
-
-
-
6
-
-
33645751214
-
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
-
Cryptography and Coding, IMA Int. Conf, Springer
-
L. Chen and Z. Cheng, "Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme," in Cryptography and Coding, IMA Int. Conf., LNCS 3796, Springer, 2005, pp. 442-159.
-
(2005)
LNCS
, vol.3796
, pp. 442-159
-
-
Chen, L.1
Cheng, Z.2
-
7
-
-
33645735382
-
Efficient ID-KEM based on the Sakai-Kasahara key construction
-
L. Chen, Z. Cheng, J. Malone-Lee, and N. Smart, "Efficient ID-KEM based on the Sakai-Kasahara key construction," IEE Proceedings Information Security, vol. 153, pp.19-26, 2006.
-
(2006)
IEE Proceedings Information Security
, vol.153
, pp. 19-26
-
-
Chen, L.1
Cheng, Z.2
Malone-Lee, J.3
Smart, N.4
-
8
-
-
36348947793
-
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," CoRR, abs/cs/0602007, 2006.
-
(2006)
CoRR, abs/cs/0602007
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
9
-
-
84937543435
-
-
T. Okamoto and D. Pointcheval, REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform, in Topics in Cryptology (CT-RSA 2001), LNCS 2020, Springer, 2001, pp. 159-175.
-
T. Okamoto and D. Pointcheval, "REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform," in Topics in Cryptology (CT-RSA 2001), LNCS 2020, Springer, 2001, pp. 159-175.
-
-
-
-
10
-
-
34547325357
-
Secure attribute-based systems
-
ACM
-
M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, "Secure attribute-based systems," in ACM Conference on Computer and Communications Security, ACM, 2006, pp. 99-112.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 99-112
-
-
Pirretti, M.1
Traynor, P.2
McDaniel, P.3
Waters, B.4
-
11
-
-
24944554962
-
Fuzzy Identity-Based Encryption
-
Advances in Cryptology-EUROCRYPT 2005, Springer
-
A. Sahai and B. Waters, "Fuzzy Identity-Based Encryption," in Advances in Cryptology-EUROCRYPT 2005, LNCS 3494, Springer, 2005, pp. 457-173.
-
(2005)
LNCS
, vol.3494
, pp. 457-173
-
-
Sahai, A.1
Waters, B.2
-
12
-
-
33645585449
-
ID based Cryptosystems with Pairing on Elliptic Curve
-
Cryptology ePrint Archive, Report 2003/054
-
R. Sakai and M. Kasahara, "ID based Cryptosystems with Pairing on Elliptic Curve," Cryptology ePrint Archive, Report 2003/054, 2003.
-
(2003)
-
-
Sakai, R.1
Kasahara, M.2
-
13
-
-
0018545449
-
How to Share a Secret
-
A. Shamir, "How to Share a Secret," Commun. ACM, vol.22, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
|