-
1
-
-
0345490607
-
Certificateless public key cryptography
-
Laih, C.-S, ed, ASIACRYPT 2003, Springer, Heidelberg
-
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452-473. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
2
-
-
84876300178
-
-
Au, M., Chen, J., Liu, J., Mu, Y., Wong, D., Yang, G.: Malicious KGC attacks in certificateless cryptography. In: ASIACCS 2007, pp. 302-311. ACM Press, New York (2007)
-
Au, M., Chen, J., Liu, J., Mu, Y., Wong, D., Yang, G.: Malicious KGC attacks in certificateless cryptography. In: ASIACCS 2007, pp. 302-311. ACM Press, New York (2007)
-
-
-
-
3
-
-
33645958856
-
-
Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, 3650, pp. 134-148. Springer, Heidelberg (2005)
-
Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 134-148. Springer, Heidelberg (2005)
-
-
-
-
4
-
-
0027726717
-
-
ACM CCS, ACM Press, New York 1993
-
Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: ACM CCS 1993, pp. 62-73. ACM Press, New York (1993)
-
(1993)
Random oracles are practical: A paradigm for designing efficient protocols
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
33645751082
-
Generic constructions of identity-based and certificateless KEMs. Cryptology ePrint Archive
-
Report 2005/058
-
Bentahar, K., Farshim, P., Malone-Lee, J.: Generic constructions of identity-based and certificateless KEMs. Cryptology ePrint Archive, Report 2005/058 (2005), http://eprint.iacr.org/2005/058
-
(2005)
-
-
Bentahar, K.1
Farshim, P.2
Malone-Lee, J.3
-
6
-
-
33744808601
-
Efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/012
-
Cheng, Z., Comley, R.: Efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/012 (2005), http://eprint.iacr.org/2005/ 012
-
-
-
Cheng, Z.1
Comley, R.2
-
7
-
-
38149141898
-
A survey of certificateless encryption schemes and security models. Cryptology ePrint Archive
-
Report 2006/211
-
Dent, A.W.: A survey of certificateless encryption schemes and security models. Cryptology ePrint Archive, Report 2006/211 (2006), http://eprint.iacr. org/2006/211
-
(2006)
-
-
Dent, A.W.1
-
8
-
-
40249085730
-
-
Dent, A., Libert, B., Paterson, K.: Certificateless encryption schemes strongly secure in the standard model. In: Cramer, R. (ed.) PKC 2008. LNCS, 4939, pp. 344-359. Springer, Heidelberg (2008)
-
Dent, A., Libert, B., Paterson, K.: Certificateless encryption schemes strongly secure in the standard model. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 344-359. Springer, Heidelberg (2008)
-
-
-
-
9
-
-
84955339164
-
Secure Integration of Asymmetirc and Symmetric Encryption Schemes
-
Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
Fujisaki, E., Okamoto, T.: Secure Integration of Asymmetirc and Symmetric Encryption Schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537-554. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
10
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
-
Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272-293. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 272-293
-
-
Gentry, C.1
-
11
-
-
84937570422
-
Self-certified public keys
-
Davies, D.W, ed, EUROCRYPT 1991, Springer, Heidelberg
-
Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490-497. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 490-497
-
-
Girault, M.1
-
12
-
-
38149074788
-
-
Huang, Q., Wong, D.S.: Generic certificateless encryption in the standard model. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, 4752, pp. 278-291. Springer, Heidelberg (2007)
-
Huang, Q., Wong, D.S.: Generic certificateless encryption in the standard model. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol. 4752, pp. 278-291. Springer, Heidelberg (2007)
-
-
-
-
13
-
-
44349096469
-
Certificateless Public Key Encryption Secure against KGC Attacks in the Standard Model
-
Hwang, Y.H., Liu, J.K., Chow, S.S.M.: Certificateless Public Key Encryption Secure against KGC Attacks in the Standard Model. Journal of Universal Computer Science, Special Issue on Cryptography in Computer System Security 14(3), 463-480 (2008)
-
(2008)
Journal of Universal Computer Science, Special Issue on Cryptography in Computer System Security
, vol.14
, Issue.3
, pp. 463-480
-
-
Hwang, Y.H.1
Liu, J.K.2
Chow, S.S.M.3
-
14
-
-
84876341103
-
-
Liu, J., Au, M., Susilo, W.: Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: ASIACCS 2007, pp. 273-283. ACM Press, New York (2007)
-
Liu, J., Au, M., Susilo, W.: Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: ASIACCS 2007, pp. 273-283. ACM Press, New York (2007)
-
-
-
-
15
-
-
38049007949
-
-
Lai, J., Kou, W.: Self-Generated-Certificate Public Key Encryption Without Pairing. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, 4450, pp. 476-489. Springer, Heidelberg (2007)
-
Lai, J., Kou, W.: Self-Generated-Certificate Public Key Encryption Without Pairing. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 476-489. Springer, Heidelberg (2007)
-
-
-
-
16
-
-
33745833916
-
-
Libert, B., Quisquater, J.: On constructing certificateless cryptosystems from identity based encryption. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 474-490. Springer, Heidelberg (2006)
-
Libert, B., Quisquater, J.: On constructing certificateless cryptosystems from identity based encryption. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 474-490. Springer, Heidelberg (2006)
-
-
-
-
18
-
-
50049104871
-
-
Park, J.H., Choi, K.Y., Hwang, J.Y., Lee, D.H.: Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, 4575, pp. 60-82. Springer, Heidelberg (2007)
-
Park, J.H., Choi, K.Y., Hwang, J.Y., Lee, D.H.: Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 60-82. Springer, Heidelberg (2007)
-
-
-
-
20
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
21
-
-
38049036156
-
Provable efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/287
-
Shi, Y., Li, J.: Provable efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/287 (2005), http://eprint.iacr.org/2005/287
-
-
-
Shi, Y.1
Li, J.2
-
22
-
-
38349041777
-
-
Sun, Y., Zhang, F., Baek, J.: Strongly Secure Certificateless Public Key Encryption without Pairing. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, 4856, pp. 194-208. Springer, Heidelberg (2007)
-
Sun, Y., Zhang, F., Baek, J.: Strongly Secure Certificateless Public Key Encryption without Pairing. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 194-208. Springer, Heidelberg (2007)
-
-
-
-
23
-
-
33645584388
-
Generic construction of certificateless encryption
-
Laganá, A, Gavrilova, M.L, Kumar, V, Mun, Y, Tan, C.J.K, Gervasi, O, eds, ICCSA 2004, Springer, Heidelberg
-
Yum, D.H., Lee, P.J.: Generic construction of certificateless encryption. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 802-811. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3043
, pp. 802-811
-
-
Yum, D.H.1
Lee, P.J.2
|