-
2
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
Shamir A. Identity based cryptosystems and signature schemes. Lecture Notes in Computer Science 196 (1984) 37-53
-
(1984)
Lecture Notes in Computer Science
, vol.196
, pp. 37-53
-
-
Shamir, A.1
-
4
-
-
33646820668
-
Efficient and provably secure identity based signature and signcryption from bilinear maps
-
Paulo S.L., Barreto M., Benoit L., et al. Efficient and provably secure identity based signature and signcryption from bilinear maps. Lecture Notes in Computer Science 3788 (2005) 515-532
-
(2005)
Lecture Notes in Computer Science
, vol.3788
, pp. 515-532
-
-
Paulo, S.L.1
Barreto, M.2
Benoit, L.3
-
5
-
-
24744440154
-
Secure key issuing in ID-based cryptography
-
Dunedin, New Zealand
-
Lee B, Boyd C, Dawson E, et al. Secure key issuing in ID-based cryptography. In: Proceedings of the Second Australian Information Security Workshop-AISW 2004. Dunedin, New Zealand, 2004, 32: 69-74.
-
(2004)
Proceedings of the Second Australian Information Security Workshop-AISW
, vol.32
, pp. 69-74
-
-
Lee, B.1
Boyd, C.2
Dawson, E.3
-
6
-
-
38049125096
-
Reducing trust in the PKG in identity based cryptosystems
-
Goyal V. Reducing trust in the PKG in identity based cryptosystems. Lecture Notes in Computer Science 4450 (2007) 430-447
-
(2007)
Lecture Notes in Computer Science
, vol.4450
, pp. 430-447
-
-
Goyal, V.1
-
7
-
-
84944050090
-
Applications of multiple trust authorities in pairing based cryptosystems
-
Chen L., Harrison K., and Solera S.N.P. Applications of multiple trust authorities in pairing based cryptosystems. Lecture Notes in Computer Science 2437 (2002) 260-275
-
(2002)
Lecture Notes in Computer Science
, vol.2437
, pp. 260-275
-
-
Chen, L.1
Harrison, K.2
Solera, S.N.P.3
-
8
-
-
35248866223
-
Certificate based encryption and the certificate revocation problem
-
Gentry C. Certificate based encryption and the certificate revocation problem. Lecture Notes in Computer Science 2656 (2003) 272-293
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 272-293
-
-
Gentry, C.1
-
12
-
-
84876341103
-
Self-generated-certificate public key cryptography and certificateless signature/encryption schemes in the standard model
-
Singapore
-
Liu J K, Au M H, Susilo W. Self-generated-certificate public key cryptography and certificateless signature/encryption schemes in the standard model. In: Proc. ACM Symposium on Information, Computer and Communications Security. Singapore, 2007: 273-283.
-
(2007)
Proc. ACM Symposium on Information, Computer and Communications Security
, pp. 273-283
-
-
Liu, J.K.1
Au, M.H.2
Susilo, W.3
-
16
-
-
40249085730
-
Certificateless encryption schemes strongly secure in the standard model
-
Dent A.W., Libert B., and Paterson K.G. Certificateless encryption schemes strongly secure in the standard model. Lecture Notes in Computer Science 3108 (2004) 344-359
-
(2004)
Lecture Notes in Computer Science
, vol.3108
, pp. 344-359
-
-
Dent, A.W.1
Libert, B.2
Paterson, K.G.3
-
17
-
-
67651112346
-
Generic construction of certificateless signature
-
Yum D.H., and Lee P. Generic construction of certificateless signature. Lecture Notes in computer Science 4939 (2008) 200-211
-
(2008)
Lecture Notes in computer Science
, vol.4939
, pp. 200-211
-
-
Yum, D.H.1
Lee, P.2
-
18
-
-
33744786523
-
On the security of certificateless signature scheme from Asiacrypto 2003
-
Huang X., Susilo W., Mu Y., et al. On the security of certificateless signature scheme from Asiacrypto 2003. Lecture Notes in Computer Science 3810 (2005) 13-25
-
(2005)
Lecture Notes in Computer Science
, vol.3810
, pp. 13-25
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
-
19
-
-
33745833916
-
On constructing certificateless cryptosystems from identity based encryption
-
Libert B., and Quisquater J.J. On constructing certificateless cryptosystems from identity based encryption. Lecture Notes in Computer Science 3958 (2006) 474-490
-
(2006)
Lecture Notes in Computer Science
, vol.3958
, pp. 474-490
-
-
Libert, B.1
Quisquater, J.J.2
-
20
-
-
44349096469
-
Certificateless public key encryption secure against malicious KGC attacks in the standard model
-
Hwang Y.H., and Liu J.K. Certificateless public key encryption secure against malicious KGC attacks in the standard model. Journal of Universal Computer Science 14 3 (2008) 463-480
-
(2008)
Journal of Universal Computer Science
, vol.14
, Issue.3
, pp. 463-480
-
-
Hwang, Y.H.1
Liu, J.K.2
-
21
-
-
38049007949
-
Self-generated-certificate public key encryption without pairing
-
Lai J., and Kou W. Self-generated-certificate public key encryption without pairing. Lecture Notes in Computer Science 4450 (2007) 476-489
-
(2007)
Lecture Notes in Computer Science
, vol.4450
, pp. 476-489
-
-
Lai, J.1
Kou, W.2
|