-
1
-
-
43249104504
-
Generic constructions of identity-based and certificateless KEMs
-
DOI 10.1007/s00145-007-9000-z
-
Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless KEMs. Journal of Cryptology 21(2), 178-199 (2008) (Pubitemid 351653335)
-
(2008)
Journal of Cryptology
, vol.21
, Issue.2
, pp. 178-199
-
-
Bentahar, K.1
Farshim, P.2
Malone-Lee, J.3
Smart, N.P.4
-
2
-
-
35048841300
-
Efficient selective-ID secure identity-based encryption without random oracles
-
In: Cachin, C., Camenisch, J.L. (eds.). LNCS. Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
3
-
-
35048848152
-
Short signatures without random oracles
-
In: Cachin, C., Camenisch, J.L. (eds.). LNCS. Springer, Heidelberg
-
Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 56-73. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
4
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 440-456. Springer, Heidelberg (2005) (Pubitemid 41313968)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
5
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.2139, pp. 213-229. Springer, Heidelberg (2001) (Pubitemid 33317917)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
43149116953
-
Space-efficient identity based encryptionwithout pairings
-
Providence, USA. IEEE Computer Society Press, Los Alamitos
-
Boneh, D., Gentry, C., Hamburg, M.: Space-efficient identity based encryptionwithout pairings. In: 48th FOCS, Providence, USA, pp. 647-657. IEEE Computer Society Press, Los Alamitos (2007)
-
(2007)
48th FOCS
, pp. 647-657
-
-
Boneh, D.1
Gentry, C.2
Hamburg, M.3
-
7
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
In: Biham, E. (ed.). LNCS. Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.2656, pp. 255-271. Springer, Heidelberg (2003)
-
(2003)
EUROCRYPT 2003
, vol.2656
, pp. 255-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
8
-
-
38049112331
-
Simulatable vRFs with applications to multi-theorem NIZK
-
In: Menezes, A. (ed.). LNCS. Springer, Heidelberg
-
Chase, M., Lysyanskaya, A.: Simulatable vRFs with applications to multi-theorem NIZK. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.4622, pp. 303-322. Springer, Heidelberg (2007)
-
(2007)
CRYPTO 2007
, vol.4622
, pp. 303-322
-
-
Chase, M.1
Lysyanskaya, A.2
-
9
-
-
33746042561
-
Security analysis of the strong Diffie-Hellman problem
-
DOI 10.1007/11761679-1, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Cheon, J.H.: Security analysis of the strong diffie-hellman problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.4004, pp. 1-11. Springer, Heidelberg (2006) (Pubitemid 44072229)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004
, pp. 1-11
-
-
Cheon, J.H.1
-
10
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
In: Honary, B. (ed.). LNCS. Springer, Heidelberg
-
Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol.2260, pp. 360-363. Springer, Heidelberg (2001)
-
(2001)
Cryptography and Coding 2001
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
11
-
-
84958742006
-
Efficient Construction of (Distributed) Verifiable Random Functions
-
Public Key Cryptography - PKC 2003
-
Dodis, Y.: Efficient construction of (Distributed) verifiable random functions. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.2567, pp. 1-17. Springer, Heidelberg (2002) (Pubitemid 36137124)
-
(2002)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2567
, pp. 1-17
-
-
Dodis, Y.1
-
13
-
-
24144481228
-
A verifiable random function with short proofs and keys
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
Dodis, Y., Yampolskiy, A.: A verifiable random function with short proofs and keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.3386, pp. 416-431. Springer, Heidelberg (2005) (Pubitemid 41231346)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 416-431
-
-
Dodis, Y.1
Yampolskiy, A.2
-
14
-
-
33746062799
-
Practical identity-based encryption without random oracles
-
DOI 10.1007/11761679-27, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.4004, pp. 445-464. Springer, Heidelberg (2006) (Pubitemid 44072255)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004
, pp. 445-464
-
-
Gentry, C.1
-
15
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
Seattle, Washington, USA, May 15-17. ACM Press, New York
-
Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: 21st ACM STOC, Seattle, Washington, USA, May 15-17, pp. 25-32. ACM Press, New York (1989)
-
(1989)
21st ACM STOC
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.A.2
-
16
-
-
85008172715
-
Invariant signatures and non-interactive zeroknowledge proofs are equivalent
-
In: Brickell, E.F. (ed.). LNCS. Springer, Heidelberg
-
Goldwasser, S., Ostrovsky, R.: Invariant signatures and non-interactive zeroknowledge proofs are equivalent. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.740, pp. 228-245. Springer, Heidelberg (1993)
-
(1993)
CRYPTO 1992
, vol.740
, pp. 228-245
-
-
Goldwasser, S.1
Ostrovsky, R.2
-
17
-
-
35048900318
-
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme
-
Advances in Cryptology - EUROCRYPT 2004
-
Jarecki, S., Shmatikov, V.: Handcuffing big brother: an abuse-resilient transaction escrow scheme. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 590-608. Springer, Heidelberg (2004) (Pubitemid 38717028)
-
(2004)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.3027
, pp. 590-608
-
-
Jarecki, S.1
Shmatikov, V.2
-
18
-
-
33646764587
-
Updatable zero-knowledge databases
-
DOI 10.1007/11593447-10, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
Liskov, M.: Updatable zero-knowledge databases. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.3788, pp. 174-198. Springer, Heidelberg (2005) (Pubitemid 43763475)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3788
, pp. 174-198
-
-
Liskov, M.1
-
19
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing 17(2) (1988)
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 2
-
-
Luby, M.1
Rackoff, C.2
-
20
-
-
84937425161
-
Unique signatures and verifiable random functions from the DHDDH separation
-
In: Yung, M. (ed.). LNCS. Springer, Heidelberg
-
Lysyanskaya, A.: Unique signatures and verifiable random functions from the DHDDH separation. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.2442, pp. 597-612. Springer, Heidelberg (2002)
-
(2002)
CRYPTO 2002
, vol.2442
, pp. 597-612
-
-
Lysyanskaya, A.1
-
22
-
-
84880857867
-
Soundness in the Public-Key Model
-
Advances in Cryptology - CRYPTO 2001
-
Micali, S., Reyzin, L.: Soundness in the public-key model. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.2139, pp. 542-565. Springer, Heidelberg (2001) (Pubitemid 33317936)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2139
, pp. 542-565
-
-
Micali, S.1
Reyzin, L.2
-
23
-
-
84944900444
-
Micropayments revisited
-
In: Preneel, B. (ed.). LNCS. Springer, Heidelberg
-
Micali, S., Rivest, R.L.: Micropayments revisited. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.2271, pp. 149-163. Springer, Heidelberg (2002)
-
(2002)
CT-RSA 2002
, vol.2271
, pp. 149-163
-
-
Micali, S.1
Rivest, R.L.2
-
24
-
-
0031332843
-
Number-theoretic constructions of efficient pseudo-random functions
-
Miami Beach, Florida, October 19-22. IEEE Computer Society Press, Los Alamitos
-
Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. In: 38th FOCS, Miami Beach, Florida, October 19-22, pp. 458-467. IEEE Computer Society Press, Los Alamitos (1997)
-
(1997)
38th FOCS
, pp. 458-467
-
-
Naor, M.1
Reingold, O.2
-
26
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
In: Blakely, G.R., Chaum, D. (eds.). LNCS. Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
CRYPTO 1984
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
27
-
-
24944566040
-
Efficient Identity-Based Encryption without random oracles
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 114-127. Springer, Heidelberg (2005) (Pubitemid 41313949)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 114-127
-
-
Waters, B.1
|