-
1
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
3621 LNCS Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., MaloneLee, J., Neven, G., Paillier, P., Shi, H.: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005) (Pubitemid 43902115)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
33745797863
-
Untraceable RFID tag via insubvertible encryption
-
DOI 10.1145/1102120.1102134, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
-
Ateniese, G., Camenisch, J., de Medeiros, B.: Untraceable RFID Tags via Insubvertible Encryption. In: CCS 2005: Proceedings of the 12th ACM conference on Computer and communications security, pp. 92-101. ACM, New York (2005) (Pubitemid 44021993)
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 92-101
-
-
Ateniese, G.1
Camenisch, J.2
De Medeiros, B.3
-
3
-
-
35248851617
-
Correlation-Resistant Storage via KeywordSearchable Encryption
-
Report 2005/417
-
Ballard, L., Green, M., de Medeiros, B., Monrose, F.: Correlation-Resistant Storage via KeywordSearchable Encryption. In: Cryptology ePrint Archive, Report 2005/417 (2005), http://eprint.iacr.org/2005/417
-
(2005)
Cryptology ePrint Archive
-
-
Ballard, L.1
Green, M.2
De Medeiros, B.3
Monrose, F.4
-
4
-
-
84946837370
-
Key-Privacy in Public-Key Encryption
-
Advances in Cryptology - ASIACRYPT 2001
-
Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-Privacy in Public-Key Encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566-582. Springer, Heidelberg (2001) (Pubitemid 33371207)
-
(2002)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2248
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
5
-
-
33645751082
-
Generic constructions of identity-based and certificateless KEMs
-
Report 2005/058
-
Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.: Generic Constructions of Identity-Based and Certificateless KEMs. In: Cryptology ePrint Archive, Report 2005/058 (2005), http://eprint.iacr.org/2005/058
-
(2005)
Cryptology ePrint Archive
-
-
Bentahar, K.1
Farshim, P.2
Malone-Lee, J.3
Smart, N.4
-
6
-
-
35048887476
-
Short group signatures
-
In: Franklin, M. (ed.) Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
CRYPTO 2004. LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
7
-
-
35048901123
-
Public key encryption with keyword search
-
In: Cachin, C., Camenisch, J.L. (eds.) Springer, Heidelberg
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
8
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. SIAM Journal on Computing 32(3), 586-615 (2003)
-
(2003)
SIAM Journal on Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
43149116953
-
Space-efficient identity based encryption without pairings
-
IEEE Computer Society, Washington
-
Boneh, D., Gentry, C., Hamburg, M.: Space-Efficient Identity Based Encryption Without Pairings. In: FOCS 2007: Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, pp. 647-657. IEEE Computer Society, Washington (2007)
-
(2007)
FOCS 2007: Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science
, pp. 647-657
-
-
Boneh, D.1
Gentry, C.2
Hamburg, M.3
-
10
-
-
33749573228
-
Anonymous hierarchical identity-based encryption (Without random oracles)
-
4117 LNCS Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
Boyen, X., Waters, B.: Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 290-307. Springer, Heidelberg (2006) (Pubitemid 44532122)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 290-307
-
-
Boyen, X.1
Waters, B.2
-
11
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
In: Honary, B. (ed.) Springer, Heidelberg
-
Cocks, C.: An Identity Based Encryption Scheme Based on Quadratic Residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360-363. Springer, Heidelberg (2001)
-
(2001)
Cryptography and Coding 2001. LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
12
-
-
84870707379
-
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
-
Advances in Cryptology - CRYPTO '98
-
Cramer, R., Shoup, V.: A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998) (Pubitemid 128118994)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
13
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
Cramer, R., Shoup, V.: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack. SIAM Journal on Computing 33(1), 167-226 (2004)
-
(2004)
SIAM Journal on Computing
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
14
-
-
38349025630
-
Public key encryption with searchable keywords based on jacobi symbols
-
In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) Springer, Heidelberg
-
Di Crescenzo, G., Saraswat, V.: Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 282-296. Springer, Heidelberg (2007)
-
(2007)
INDOCRYPT 2007. LNCS
, vol.4859
, pp. 282-296
-
-
Di Crescenzo, G.1
Saraswat, V.2
-
15
-
-
85027148495
-
On the randomness of legendre and jacobi sequences
-
In: Goldwasser, S. (ed.) Springer, Heidelberg
-
Damgård, I.B.: On the Randomness of Legendre and Jacobi Sequences. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 163-172. Springer, Heidelberg (1990)
-
(1990)
CRYPTO 1988. LNCS
, vol.403
, pp. 163-172
-
-
Damgård, I.B.1
-
16
-
-
33646764832
-
A sufficient condition for key-privacy
-
Report 2005/05
-
Halevi, S.: A Sufficient Condition for Key-Privacy. In: Cryptology ePrint Archive, Report 2005/05 (2005), http://eprint.iacr.org/2005/005
-
(2005)
Cryptology ePrint Archive
-
-
Halevi, S.1
-
17
-
-
33646767808
-
Universally anonymizable public-key encryption
-
3788 LNCSDOI 10.1007/11593447-16, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
Hayashi, R., Tanaka, K.: Universally Anonymizable Public-Key Encryption. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 293-312. Springer, Heidelberg (2005) (Pubitemid 43763481)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 293-312
-
-
Hayashi, R.1
Tanaka, K.2
-
19
-
-
2642549675
-
Cryptosystems based on pairing
-
Okinawa, Japan
-
Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems Based on Pairing. In: Symposium on Cryptography and Information Security (SCIS 2000), Okinawa, Japan (2000)
-
(2000)
Symposium on Cryptography and Information Security (SCIS 2000)
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
20
-
-
33646718113
-
Authenticated ID-based key exchange and remote log-in with insecure token and PIN number
-
Report 2002/164
-
Scott, M.: Authenticated ID-based Key Exchange and Remote Log-in With Insecure Token and PIN Number. In: Cryptology ePrint Archive, Report 2002/164 (2002), http://eprint.iacr.org/2002/164
-
(2002)
Cryptology ePrint Archive
-
-
Scott, M.1
-
21
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
In: Blakely, G.R., Chaum, D. (eds.) Springer, Heidelberg
-
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
CRYPTO 1984. LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
22
-
-
84869369574
-
Shamus software
-
Shamus Software. The MIRACL library, http://www.shamus.ie
-
The MIRACL library
-
-
|