-
1
-
-
0038487086
-
Secret handshakes from pairing-based key agreements
-
IEEE Computer Society Press
-
Balfanz D., Durfee G., Shankar N., Smetters D., Staddon J., Wong H.-C.: Secret handshakes from pairing-based key agreements. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp. 180-196. IEEE Computer Society Press (2003).
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 180-196
-
-
Balfanz, D.1
Durfee, G.2
Shankar, N.3
Smetters, D.4
Staddon, J.5
Wong, H.-C.6
-
2
-
-
84945119254
-
Entity authentication and key distribution
-
Stinson D.R. (ed.) Springer-Verlag
-
Bellare M., Rogaway P.: Entity authentication and key distribution. In: Stinson D.R. (ed.) CRYPTO'93, LNCS 773, pp. 232-249. Springer-Verlag (1994).
-
(1994)
CRYPTO'93, LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols
-
ACM Press
-
Bellare M., Canetti R., Krawczyk H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: 30th STOC, pp. 419-428. ACM Press (1998).
-
(1998)
30th STOC
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
43249104504
-
Generic constructions of identity-based and certificateless KEMs
-
K. Bentahar P. Farshim J. Malone-Lee N.P. Smart 2008 Generic constructions of identity-based and certificateless KEMs J. Cryptol. 21 2 178 199
-
(2008)
J. Cryptol.
, vol.21
, Issue.2
, pp. 178-199
-
-
Bentahar, K.1
Farshim, P.2
Malone-Lee, J.3
Smart, N.P.4
-
5
-
-
84949230533
-
Key agreement protocols and their security analysis
-
Darnell M. (ed.) Cryptography and Coding, 6th IMA International Conference Springer-Verlag
-
Blake-Wilson S., Johnson D., Menezes A.: Key agreement protocols and their security analysis. In: Darnell M. (ed.) Cryptography and Coding, 6th IMA International Conference, LNCS 1355, pp. 30-45. Springer-Verlag (1997).
-
(1997)
LNCS
, vol.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
6
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Kilian J. (ed.) CRYPTO 2001 Springer-Verlag
-
Boneh D., Franklin M.: Identity-based encryption from the Weil pairing. In: Kilian J. (ed.) CRYPTO 2001, LNCS 2139, pp. 213-229. Springer-Verlag (2001).
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
43149116953
-
Space-efficient identity based encryption without pairings
-
IEEE Computer Society Full version available at Cryptology ePrint Archive, Report 2007/177
-
Boneh D., Gentry C., Hamburg M.: Space-efficient identity based encryption without pairings. In: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), pp. 647-657. IEEE Computer Society (2007). Full version available at Cryptology ePrint Archive, Report 2007/177. http://eprint.iacr.org/.
-
(2007)
48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007)
, pp. 647-657
-
-
Boneh, D.1
Gentry, C.2
Hamburg, M.3
-
8
-
-
35048899816
-
Key agreement using statically keyed authenticators
-
Jakobsson M., et al. (eds.) ACNS 2004 Springer-Verlag
-
Boyd C., Mao W., Paterson K.G.: Key agreement using statically keyed authenticators. In: Jakobsson M., et al. (eds.) ACNS 2004, LNCS 3089, pp. 248-262. Springer-Verlag (2004).
-
(2004)
LNCS
, vol.3089
, pp. 248-262
-
-
Boyd, C.1
Mao, W.2
Paterson, K.G.3
-
9
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Pfitzmann B. (ed.) EUROCRYPT 2001 Springer-Verlag
-
Canetti R., Krawczyk H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann B. (ed.) EUROCRYPT 2001, LNCS 2045, pp. 453-474. Springer-Verlag (2001).
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
10
-
-
77956089601
-
Factorization of a 512-bit RSA modulus
-
Preneel B. (ed.) EUROCRYPT 2000 Springer-Verlag
-
Cavallar S., Dodson B., Lenstra A.K., Lioen W.M., Montgomery P.L., Murphy B., te Riele H., Aardal K., Gilchrist J., Guillerm G., Leyland P.C., Marchand J., Morain F., Muffett A., Putnam C., Putnam C., Zimmermann P.: Factorization of a 512-Bit RSA modulus. In: Preneel B. (ed.) EUROCRYPT 2000, LNCS 1807, pp. 1-18. Springer-Verlag (2000).
-
(2000)
LNCS
, vol.1807
, pp. 1-18
-
-
Cavallar, S.1
Dodson, B.2
Lenstra, A.K.3
Lioen, W.M.4
Montgomery, P.L.5
Murphy, B.6
Te Riele, H.7
Aardal, K.8
Gilchrist, J.9
Guillerm, G.10
Leyland, P.C.11
Marchand, J.12
Morain, F.13
Muffett, A.14
Putnam, C.15
Putnam, C.16
Zimmermann, P.17
-
11
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Honary B. (ed.) Cryptography and Coding, 8th IMA International Conference Springer-Verlag
-
Cocks C.: An identity based encryption scheme based on quadratic residues. In: Honary B. (ed.) Cryptography and Coding, 8th IMA International Conference, LNCS 2260, pp. 360-363. Springer-Verlag (2001).
-
(2001)
LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
12
-
-
33746690345
-
Hidden pairings and trapdoor DDH groups
-
Hess F., Pauli S., Pohst M. (eds.) Algorithmic Number Theory: 7th International Symposium (ANTS VII) Springer-Verlag
-
Dent A.W., Galbraith S.D.: Hidden pairings and trapdoor DDH groups. In: Hess F., Pauli S., Pohst M. (eds.) Algorithmic Number Theory: 7th International Symposium (ANTS VII), LNCS 4076, pp. 436-451. Springer-Verlag (2006).
-
(2006)
LNCS
, vol.4076
, pp. 436-451
-
-
Dent, A.W.1
Galbraith, S.D.2
-
13
-
-
29244438183
-
Provably secure non-interactive key distribution based on pairings
-
See also cryptology ePrint archive, report 2002/136 (2002)
-
Dupont R., Enge A.: Provably secure non-interactive key distribution based on pairings. Discrete Appl. Math. 154(2), 270-276 (2006). See also cryptology ePrint archive, report 2002/136 (2002). http://eprint.iacr.org/.
-
(2006)
Discrete Appl. Math.
, vol.154
, Issue.2
, pp. 270-276
-
-
Dupont, R.1
Enge, A.2
-
14
-
-
84947261826
-
Extending the GHS Weil descent attack
-
Knudsen L. (ed.) EUROCRYPT 2002 Springer-Verlag
-
Galbraith S., Hess F., Smart N.P.: Extending the GHS Weil descent attack. In: Knudsen L. (ed.) EUROCRYPT 2002, LNCS 2332, pp. 29-44. Springer-Verlag (2002).
-
(2002)
LNCS
, vol.2332
, pp. 29-44
-
-
Galbraith, S.1
Hess, F.2
Smart, N.P.3
-
15
-
-
53249117524
-
Pairings for cryptographers
-
Available from cryptology ePrint archive: report 2006/165 (2006)
-
Galbraith S.D., Paterson K.G., Smart N.P.: Pairings for cryptographers. Discrete Appl. Math. 156, 3113-3121 (2008). Available from cryptology ePrint archive: report 2006/165 (2006). http://eprint.iacr.org/.
-
(2008)
Discrete Appl. Math.
, vol.156
, pp. 3113-3121
-
-
Galbraith, S.D.1
Paterson, K.G.2
Smart, N.P.3
-
16
-
-
51849137205
-
Trapdoors for hard lattices and new cryptographic constructions
-
Ladner R.E., Dwork C. (eds.) ACM Full version available from cryptology ePrint archive: report 2007/432 (2007)
-
Gentry C., Peikert C., Vaikuntanathan V.: Trapdoors for hard lattices and new cryptographic constructions. In: Ladner R.E., Dwork C. (eds.) Proceedings of the 40th Annual ACM Symposium on Theory of Computing, pp. 197-206, ACM (2008). Full version available from cryptology ePrint archive: report 2007/432 (2007). http://eprint.iacr.org/.
-
(2008)
Proceedings of the 40th Annual ACM Symposium on Theory of Computing
, pp. 197-206
-
-
Gentry, C.1
Peikert, C.2
Vaikuntanathan, V.3
-
17
-
-
0038629591
-
Designing and detecting trapdoors for discrete log cryptosystems
-
Brickell E.F. (ed.) CRYPTO'92 Springer-Verlag
-
Gordon D.M.: Designing and detecting trapdoors for discrete log cryptosystems. In: Brickell E.F. (ed.) CRYPTO'92, LNCS 740, pp. 66-75. Springer-Verlag (1993).
-
(1993)
LNCS
, vol.740
, pp. 66-75
-
-
Gordon, D.M.1
-
18
-
-
32244433334
-
K-resilient identity-based encryption in the standard model
-
Okamoto T. (ed.) CT-RSA 2004 Springer-Verlag
-
Heng S.-H., Kurosawa K.: k-resilient identity-based encryption in the standard model. In: Okamoto T. (ed.) CT-RSA 2004, LNCS 2964, pp. 67-80. Springer-Verlag (2004).
-
(2004)
LNCS
, vol.2964
, pp. 67-80
-
-
Heng, S.-H.1
Kurosawa, K.2
-
19
-
-
17644440160
-
Towards practical non-interactive public-key cryptosystems using non-maximal imaginary quadratic orders
-
D. Hühnlein M.J. Jacobson Jr. D. Weber 2003 Towards practical non-interactive public-key cryptosystems using non-maximal imaginary quadratic orders Des. Codes Cryptogr. 39 3 281 299
-
(2003)
Des. Codes Cryptogr.
, vol.39
, Issue.3
, pp. 281-299
-
-
Hühnlein, D.1
Jacobson Jr., M.J.2
Weber, D.3
-
20
-
-
33746332411
-
Generic transforms to acquire CCA-security for identity based encryption: The cases of FOpkc and REACT
-
Batten L.M., Safavi-Naini R. (eds.) ACISP 2006 Springer-Verlag
-
Kitagawa T., Yang P., Hanaoka G., Zhang R., Watanabe H., Matsuura K., Imai H.: Generic transforms to acquire CCA-security for identity based encryption: the cases of FOpkc and REACT. In: Batten L.M., Safavi-Naini R. (eds.) ACISP 2006, LNCS 4058, pp. 348-359. Springer-Verlag (2006).
-
(2006)
LNCS
, vol.4058
, pp. 348-359
-
-
Kitagawa, T.1
Yang, P.2
Hanaoka, G.3
Zhang, R.4
Watanabe, H.5
Matsuura, K.6
Imai, H.7
-
21
-
-
0242292905
-
A note on the weakness of the Maurer-Yacobi squaring method
-
Department of Computer Science, Technical University of Darmstadt, Darmstadt, Germany
-
Kügler D., Maurer M.: A Note on the Weakness of the Maurer-Yacobi Squaring Method. Technical Report TI-15/99. Department of Computer Science, Technical University of Darmstadt, Darmstadt, Germany (1999).
-
(1999)
Technical Report TI-15/99
-
-
Kügler, D.1
-
23
-
-
3042658813
-
Constructing identity-based cryptosystems for discrete logarithm based cryptosystems
-
W.-B. Lee K.-C. Liao 2004 Constructing identity-based cryptosystems for discrete logarithm based cryptosystems J. Netw. Comput. Appl. 27 191 199
-
(2004)
J. Netw. Comput. Appl.
, vol.27
, pp. 191-199
-
-
Lee, W.-B.1
Liao, K.-C.2
-
24
-
-
35748952969
-
Modified Maurer-Yacobi's scheme and its applications
-
Seberry J., Zheng Y. (eds.) ASIACRYPT92 Springer-Verlag
-
Lim C.H., Lee P.J.: Modified Maurer-Yacobi's scheme and its applications. In: Seberry J., Zheng Y. (eds.) ASIACRYPT92, LNCS 718, pp. 308-323. Springer-Verlag (1992).
-
(1992)
LNCS
, vol.718
, pp. 308-323
-
-
Lim, C.H.1
Lee, P.J.2
-
25
-
-
3042553102
-
Non-interactive public-key cryptography
-
Davies D.W. (ed.) EUROCRYPT91 Springer-Verlag
-
Maurer U., Yacobi Y.: Non-interactive public-key cryptography. In: Davies D.W. (ed.) EUROCRYPT91, LNCS 547, pp. 498-507. Springer-Verlag (1991).
-
(1991)
LNCS
, vol.547
, pp. 498-507
-
-
Maurer, U.1
Yacobi, Y.2
-
26
-
-
85027164248
-
A remark on a non-interactive public-key distribution system
-
Rueppel R.A. (ed.) EUROCRYPT92 Springer-Verlag
-
Maurer U., Yacobi Y.: A remark on a non-interactive public-key distribution system. In: Rueppel R.A. (ed.) EUROCRYPT92, LNCS 658, pp. 458-460. Springer-Verlag (1993).
-
(1993)
LNCS
, vol.658
, pp. 458-460
-
-
Maurer, U.1
Yacobi, Y.2
-
27
-
-
0012132506
-
A non-interactive public-key distribution system
-
U.M. Maurer Y. Yacobi 1996 A non-interactive public-key distribution system Des. Codes Cryptogr. 9 3 305 316
-
(1996)
Des. Codes Cryptogr.
, vol.9
, Issue.3
, pp. 305-316
-
-
Maurer, U.M.1
Yacobi, Y.2
-
29
-
-
63349099304
-
Murakami-Kasahara ID-based key sharing scheme revisited-in comparison with Maurer-Yacobi schemes
-
Murakami Y., Kasahara M.: Murakami-Kasahara ID-based key sharing scheme revisited-in comparison with Maurer-Yacobi schemes. Cryptology ePrint archive, report 2005/306 (2005). http://eprint.iacr.org/.
-
(2005)
Cryptology EPrint Archive, Report 2005/306
-
-
Murakami, Y.1
Kasahara, M.2
-
30
-
-
63349085878
-
Security of an identity-based cryptosystem and the related reductions
-
Nyberg K. (ed.) EUROCRYPT98 Springer-Verlag
-
Okamoto T., Uchiyama S.: Security of an identity-based cryptosystem and the related reductions. In: Nyberg K. (ed.) EUROCRYPT98, LNCS 1403, pp. 546-560. Springer-Verlag (1998).
-
(1998)
LNCS
, vol.1403
, pp. 546-560
-
-
Okamoto, T.1
Uchiyama, S.2
-
31
-
-
84942550998
-
Public-key cryptosystems based on composite-degree residuosity
-
Stern J. (ed.) EUROCRYPT99 Springer-Verlag
-
Paillier P.: Public-key cryptosystems based on composite-degree residuosity. In: Stern J. (ed.) EUROCRYPT99, LNCS 1592, pp. 223-238. Springer-Verlag (1999).
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
33
-
-
2642549675
-
Cryptosystems based on pairing
-
Okinawa, Japan, January
-
Sakai R., Ohgishi K., Kasahara M.: Cryptosystems based on pairing. In: The 2000 Symposium on Cryptography and Information Security, Okinawa, Japan, January, pp. 26-28 (2000).
-
(2000)
The 2000 Symposium on Cryptography and Information Security
, pp. 26-28
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
35
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakley G.R., Chaum D. (eds.) CRYPTO84 Springer-Verlag
-
Shamir A.: Identity-based cryptosystems and signature schemes. In: Blakley G.R., Chaum D. (eds.) CRYPTO84, LNCS 196, pp. 47-53. Springer-Verlag (1985).
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
36
-
-
29644436612
-
An elliptic curve trapdoor system
-
E. Teske 2006 An elliptic curve trapdoor system J. Cryptol. 19 1 115 133
-
(2006)
J. Cryptol.
, vol.19
, Issue.1
, pp. 115-133
-
-
Teske, E.1
-
37
-
-
3042551124
-
ID-based cryptographic schemes using a non-interactive public-key distribution system
-
IEEE Computer Society
-
Tseng Y.-M., Jan J.-K.: ID-based cryptographic schemes using a non-interactive public-key distribution system. In: ACSAC 1998, pp. 237-243. IEEE Computer Society (1998).
-
(1998)
ACSAC 1998
, pp. 237-243
-
-
Tseng, Y.-M.1
Jan, J.-K.2
-
38
-
-
33745678280
-
Applying Fujisaki-Okamoto to identity-based encryption
-
Fossorier M., et al. (eds.) AAECC 2006 Springer- Verlag
-
Yang P., Kitagawa T., Hanaoka G., Zhang R., Matsuura K., Imai H.: Applying Fujisaki-Okamoto to identity-based encryption. In: Fossorier M., et al. (eds.) AAECC 2006, LNCS 3857, pp. 183-192. Springer- Verlag (2006).
-
(2006)
LNCS
, vol.3857
, pp. 183-192
-
-
Yang, P.1
Kitagawa, T.2
Hanaoka, G.3
Zhang, R.4
Matsuura, K.5
Imai, H.6
|