-
1
-
-
33746332056
-
Identity-based encryption gone wild
-
DOI 10.1007/11787006-26, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
-
Abdalla, M., Catalano, D., Dent, A.W., Malone-Lee, J., Neven, G., Smart, N.P.: Identity-based encryption gone wild. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.4052, pp. 300-311. Springer, Heidelberg (2006) (Pubitemid 44113256)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4052
, pp. 300-311
-
-
Abdalla, M.1
Catalano, D.2
Dent, A.W.3
Malone-Lee, J.4
Neven, G.5
Smart, N.P.6
-
2
-
-
38049061158
-
Generalized key delegation for hierarchical identity-based encryption
-
Springer, Heidelberg (2007), In: Biskup, J., Lopez, J. (eds.). LNCS
-
Abdalla, M., Kiltz, E., Neven, G.: Generalized key delegation for hierarchical identity-based encryption. In: Biskup, J., Ĺopez, J. (eds.) ESORICS 2007. LNCS, vol.4734, pp. 139-154. Springer, Heidelberg (2007)
-
(2007)
ESORICS 2007
, vol.4734
, pp. 139-154
-
-
Abdalla, M.1
Kiltz, E.2
Neven, G.3
-
4
-
-
33746041431
-
The security of triple encryption and a framework for code-based game-playing proofs
-
DOI 10.1007/11761679-25, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.4004, pp. 409-426. Springer, Heidelberg (2006) (Pubitemid 44072253)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
38149013028
-
Efficient chosen-ciphertext secure identity-based encryption with wildcards
-
Springer, Heidelberg (2007), In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.). LNCS
-
Birkett, J.,Dent,A.W.,Neven,G., Schuldt, J.C.N.:Efficient chosen-ciphertext secure identity-based encryption with wildcards. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol.4586, pp. 274-292. Springer, Heidelberg (2007)
-
(2007)
ACISP 2007
, vol.4586
, pp. 274-292
-
-
Birkett, J.1
Dent, W.A.2
Neven, G.3
Schuldt, N.J.C.4
-
6
-
-
35048841300
-
Efficient selective-ID secure identity-based encryption without random oracles
-
Springer, Heidelberg (2004), In: Cachin, C., Camenisch, J.L. (eds.). LNCS
-
Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
7
-
-
35048848152
-
Short signatures without random oracles
-
Springer, Heidelberg (2004), In: Cachin, C., Camenisch, J.L. (eds.). LNCS
-
Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 56-73. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
8
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
Boneh, D., Franklin,M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.2139, pp. 213-229. Springer, Heidelberg (2001) (Pubitemid 33317917)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
38049123546
-
General ad hoc encryption from exponent inversion IBE
-
Springer, Heidelberg (2007), In: Naor, M. (ed.). LNCS
-
Boyen, X.: General ad hoc encryption from exponent inversion IBE. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.4515, pp. 394-411. Springer, Heidelberg (2007)
-
(2007)
EUROCRYPT 2007
, vol.4515
, pp. 394-411
-
-
Boyen, X.1
-
10
-
-
33745767987
-
Direct chosen ciphertext security from identity-based techniques
-
DOI 10.1145/1102120.1102162, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
-
Boyen, X., Mei, Q., Waters, B.: Direct chosen ciphertext security from identitybased techniques. In: Atluri, V., Meadows, C., Juels, A. (eds.) ACM CCS 2005, November 7-11, pp. 320-329. ACM Press, New York (2005) (Pubitemid 44022015)
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 320-329
-
-
Boyen, X.1
Mei, Q.2
Waters, B.3
-
11
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Springer, Heidelberg (2004), In: Cachin, C., Camenisch, J.L. (eds.). LNCS
-
Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 207-222. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
12
-
-
33745840439
-
Trading time for space: Towards an efficient IBE scheme with short (er) public parameters in the standard model
-
DOI 10.1007/11734727-33, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers
-
Chatterjee, S., Sarkar, P.: Trading time for space: Towards an efficient IBE scheme with short(er) public parameters in the standard model. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol.3935, pp. 424-440. Springer, Heidelberg (2006) (Pubitemid 44029549)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3935
, pp. 424-440
-
-
Chatterjee, S.1
Sarkar, P.2
-
13
-
-
77649262307
-
HIBE with short public parameters without random oracle
-
Springer, Heidelberg (2006), In: Lai, X., Chen, K. (eds.). LNCS
-
Chatterjee, S., Sarkar, P.: HIBE with short public parameters without random oracle. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.4284, pp. 145- 160. Springer, Heidelberg (2006)
-
(2006)
ASIACRYPT 2006
, vol.4284
, pp. 145-160
-
-
Chatterjee, S.1
Sarkar, P.2
-
14
-
-
85023982750
-
An improved protocol for demonstrating possession of discrete logarithms and some generalizations
-
Springer, Heidelberg (1988), In: Price, W.L., Chaum, D. (eds.). LNCS
-
Chaum, D., Evertse, J.-H., van de Graaf, J.: An improved protocol for demonstrating possession of discrete logarithms and some generalizations. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol.304, pp. 127-141. Springer, Heidelberg (1988)
-
(1988)
EUROCRYPT 1987
, vol.304
, pp. 127-141
-
-
Chaum, D.1
Evertse, H.J.2
Graaf, V.D.J.3
-
15
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Springer, Heidelberg (2001), In: Honary, B. (ed.). LNCS
-
Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol.2260, pp. 360-363. Springer, Heidelberg (2001)
-
(2001)
Cryptography and Coding 2001
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
16
-
-
40249083661
-
A taxonomy of pairing-friendly elliptic curves
-
Freeman, D., Scott, M., Teske, E.: A taxonomy of pairing-friendly elliptic curves. Cryptology ePrint Archive, Report 2006/372 (2007), http://eprint.iacr.org/
-
(2006)
Cryptology ePrint Archive, Report 2006/372
-
-
Freeman, D.1
Scott, M.2
Teske, E.3
-
17
-
-
36549032633
-
Pairings for cryptographers
-
Galbraith, S.D., Paterson, K.G., Smart, N.P.: Pairings for cryptographers. Cryptology ePrint Archive, Report 2006/165 (2006), http://eprint.iacr.org/
-
(2006)
Cryptology ePrint Archive, Report 2006/165
-
-
Galbraith, D.S.1
Paterson, G.K.2
Smart, P.N.3
-
18
-
-
84911480395
-
The exact security of pairing based encryption and signature schemes
-
INRIA Paris (2004)
-
Galindo, D.: The exact security of pairing based encryption and signature schemes. In: Based on a talk at Workshop on Provable Security, INRIA, Paris (2004), http://www.dgalindo.es/galindoEcrypt.pdf
-
(2004)
Based on a talk at Workshop on Provable Security
-
-
Galindo, D.1
-
19
-
-
33746062799
-
Practical identity-based encryption without random oracles
-
DOI 10.1007/11761679-27, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.4004, pp. 445-464. Springer, Heidelberg (2006) (Pubitemid 44072255)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004
, pp. 445-464
-
-
Gentry, C.1
-
20
-
-
38149091799
-
Blind identity-based encryption and simulatable oblivious transfer
-
Springer, Heidelberg (2007), In: Kurosawa, K. (ed.). LNCS
-
Green, M., Hohenberger, S.: Blind identity-based encryption and simulatable oblivious transfer. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.4833, pp. 265-282. Springer, Heidelberg (2007)
-
(2007)
ASIACRYPT 2007
, vol.4833
, pp. 265-282
-
-
Green, M.1
Hohenberger, S.2
-
21
-
-
51849152334
-
Programmable hash functions and their applications
-
Springer, Heidelberg (2008), In: Wagner, D. (ed.). LNCS
-
Hofheinz, D., Kiltz, E.: Programmable hash functions and their applications. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.5157, pp. 21-38. Springer, Heidelberg (2008)
-
(2008)
CRYPTO 2008
, vol.5157
, pp. 21-38
-
-
Hofheinz, D.1
Kiltz, E.2
-
22
-
-
84947242701
-
Toward hierarchical identity-based encryption
-
Springer, Heidelberg (2002), In: Knudsen, L.R. (ed.). LNCS
-
Horwitz, J., Lynn, B.: Toward hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.2332, pp. 466-481. Springer, Heidelberg (2002)
-
(2002)
EUROCRYPT 2002
, vol.2332
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
23
-
-
18744364723
-
Efficiency improvements for signature schemes with tight security reductions
-
October 27-30, ACM Press, New York (2003)
-
Katz, J., Ẃang, N.: Efficiency improvements for signature schemes with tight security reductions. In: ACM CCS 2003, October 27-30, pp. 155-164. ACM Press, New York (2003)
-
(2003)
ACM CCS 2003
, pp. 155-164
-
-
Katz, J.1
Wang, N.2
-
24
-
-
33746324862
-
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
-
DOI 10.1007/11780656-28, Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Proceedings
-
Kiltz, E., Galindo, D.: Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.4058, pp. 336-347. Springer, Heidelberg (2006) (Pubitemid 44113021)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4058
, pp. 336-347
-
-
Kiltz, E.1
Galindo, D.2
-
25
-
-
84946820591
-
Unbelievable security: Matching AES security using public key systems
-
Springer, Heidelberg (2001) In: Boyd, C. (ed.) . LNCS
-
Lenstra, A.K.: Unbelievable security: Matching AES security using public key systems. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.2248, pp. 67-86. Springer, Heidelberg (2001)
-
(2001)
ASIACRYPT 2001
, vol.2248
, pp. 67-86
-
-
Lenstra, K.A.1
-
28
-
-
33751508709
-
-
National Institute for Standards and Technology, NIST Special Publication 800-57
-
National Institute for Standards and Technology. Recommendation for Key Management Part 1: General (revised). NIST Special Publication 800-857 (2005)
-
(2005)
Recommendation for Key Management Part 1: General (revised)
-
-
-
29
-
-
24944554962
-
Fuzzy identity-based encryption
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 457-473. Springer, Heidelberg (2005) (Pubitemid 41313969)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
31
-
-
24944566040
-
Efficient Identity-Based Encryption without random oracles
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 114-127. Springer, Heidelberg (2005) (Pubitemid 41313949)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 114-127
-
-
Waters, B.1
|