-
1
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public Key Cryptosystems
-
Feb
-
R. Rivest, A. Shamir and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(2): pages 120-126. Feb. 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
2
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Advances in Cryptology, Proceedings of EUROCRYPT, of
-
M. Blaze, G. Bleumer and M. Strauss, Divertible protocols and atomic proxy cryptography. In Advances in Cryptology - Proceedings of EUROCRYPT 1998, volume 1403 of Lecture Notes in Computer Science, pages 127-144, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
3
-
-
79961049494
-
From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution
-
Eighth International Conference on Information and Communications Security ICICS '06, of, December
-
H. Khurana, J. Heo and M. Pant, From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution, Eighth International Conference on Information and Communications Security (ICICS '06), volume 4307 of Lecture Notes in Computer Science, pages 260-281, December 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4307
, pp. 260-281
-
-
Khurana, H.1
Heo, J.2
Pant, M.3
-
4
-
-
33745218758
-
Improved Proxy Reencryption Schemes with Applications to Secure Distributed Storage
-
Feb
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, Improved Proxy Reencryption Schemes with Applications to Secure Distributed Storage. ACM Transactions on Information and System Security (TISSEC), 9(1): pages 1-30, Feb 2006.
-
(2006)
ACM Transactions on Information and System Security (TISSEC)
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
5
-
-
24144498013
-
-
L. Chen, J. Malone-Lee, Improved Identity-Based Signcryption, Public Key Cryptography 2005 (PKC 2005), 3386 of Lecture Notes in Computer Science, pages 362-379, Springer-Verlag, 2005.
-
L. Chen, J. Malone-Lee, Improved Identity-Based Signcryption, Public Key Cryptography 2005 (PKC 2005), volume 3386 of Lecture Notes in Computer Science, pages 362-379, Springer-Verlag, 2005.
-
-
-
-
6
-
-
63449122349
-
Digital Signcryption or How to Achieve Cost (Signature & Encryption) << Cost(Signature) + Cost(Encryption)
-
Advances in Cryptology, Proceedings of CRYPTO, of, Springer-Verlag
-
Y. Zheng, Digital Signcryption or How to Achieve Cost (Signature & Encryption) << Cost(Signature) + Cost(Encryption). In Advances in Cryptology - Proceedings of CRYPTO 1997, volume 1294 of Lecture Notes in Computer Science, pages 165-179. Springer-Verlag,1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
8
-
-
84958982846
-
-
J. Baek, R. Steinfeld and Y. Zheng, Formal Proofs for the Security of Signcryption, Public Key Cryptography 2002 (PKC 2002), 2274 of Lecture Notes in Computer Science, pages 80-98. Springer-Verlag, 2002.
-
J. Baek, R. Steinfeld and Y. Zheng, Formal Proofs for the Security of Signcryption, Public Key Cryptography 2002 (PKC 2002), volume 2274 of Lecture Notes in Computer Science, pages 80-98. Springer-Verlag, 2002.
-
-
-
-
9
-
-
84957629783
-
Relations Among Notions of Security for Public-Key Encryption Schemes
-
Advances in Cryptology, CRYPTO, of, Springer-Verlag
-
M. Bellare, A. Desai, D. Pointcheval and P. Rogaway, Relations Among Notions of Security for Public-Key Encryption Schemes. In Advances in Cryptology - CRYPTO 1998, volume 1462 of Lecture Notes in Computer Science, pages 26-45. Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
11
-
-
84947237328
-
On the Security of Joint Signature and Encryption
-
Advances in Cryptology, EUROCRYPT, of, Springer-Verlag
-
J.H. An, Y. Dodis and T. Rabin, On the Security of Joint Signature and Encryption, In Advances in Cryptology - EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 83-107. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
13
-
-
70349250773
-
-
M. Green and G. Ateniese. Identity-Based Proxy Re-encryption. In Applied Cryptography and Network Security 2007 (ACNS'07). Also available at Cryptology ePrint Archive: http://eprint.iacr.org/2007/473.pdf.
-
M. Green and G. Ateniese. Identity-Based Proxy Re-encryption. In Applied Cryptography and Network Security 2007 (ACNS'07). Also available at Cryptology ePrint Archive: http://eprint.iacr.org/2007/473.pdf.
-
-
-
-
14
-
-
84958948780
-
A signcryption scheme with signature directly Verfiable by Public Key
-
Proceedings of Public Key Cryptography 1998 PKC '98, 1431 of, Springer Verlag
-
F. Bao and R.H. Deng, A signcryption scheme with signature directly Verfiable by Public Key. In Proceedings of Public Key Cryptography 1998 (PKC '98), volume 1431 of Lecture Notes in Computer Science, pages 55-59, Springer Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, pp. 55-59
-
-
Bao, F.1
Deng, R.H.2
-
16
-
-
70349255332
-
-
A. Ivan and Y. Dodis, Proxy Cryptography Revisited. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2003), San Diego, California, USA.
-
A. Ivan and Y. Dodis, Proxy Cryptography Revisited. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2003), San Diego, California, USA.
-
-
-
|