-
1
-
-
45849114774
-
A Convertible Multi-Authenticated Encryption scheme for group communications
-
T.-Y. Chang, "A Convertible Multi-Authenticated Encryption scheme for group communications," Information Sciences, vol. 178, no. 17, pp. 3426-3434, 2008.
-
(2008)
Information Sciences
, vol.178
, Issue.17
, pp. 3426-3434
-
-
Chang, T.-Y.1
-
2
-
-
37549042833
-
Broadcast group-oriented encryption secure against chosen ciphertext attack
-
C. Ma, J. Ao, J. Li, "Broadcast group-oriented encryption secure against chosen ciphertext attack," Journal of Systems Engineering and Electronics, vol. 18, no. 4, pp. 811-817, 2007.
-
(2007)
Journal of Systems Engineering and Electronics
, vol.18
, Issue.4
, pp. 811-817
-
-
Ma, C.1
Ao, J.2
Li, J.3
-
3
-
-
33646240366
-
Unconditionally secure anonymous encryption and group authentication
-
H. Goichiro, S. Junji, H. Yumiko, I. Hideki, "Unconditionally secure anonymous encryption and group authentication," Computer Journal, vol. 49, no. 3, pp. 310-321, 2006.
-
(2006)
Computer Journal
, vol.49
, Issue.3
, pp. 310-321
-
-
Goichiro, H.1
Junji, S.2
Yumiko, H.3
Hideki, I.4
-
4
-
-
33746356856
-
Representation attacks on the braid Diffie-Hellman public key encryption
-
K. G. Arkadius, "Representation attacks on the braid Diffie-Hellman public key encryption," Applicable Algebra in Engineering, Communications and Computing, vol. 17, no. 3-4, pp. 257-266, 2006.
-
(2006)
Applicable Algebra in Engineering, Communications and Computing
, vol.17
, Issue.3-4
, pp. 257-266
-
-
Arkadius, K.G.1
-
5
-
-
0037623983
-
Idetity-Based Encryption form the Weil Pairing
-
D. Boneh, M. Franklin, "Idetity-Based Encryption form the Weil Pairing," SIAM Journal of Computing, vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
85025586099
-
Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext
-
Springer
-
S. Chatterjee, P. Sarkar, "Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext," Lecture Notes in Computer Science (LNCS), Springer, 2006, Vol. 4329, pp. 394-408.
-
(2006)
Lecture Notes in Computer Science (LNCS)
, vol.4329
, pp. 394-408
-
-
Chatterjee, S.1
Sarkar, P.2
-
7
-
-
24144432124
-
Efficient Multi- Receiver Identity-Based Encryption and Its Application to Broadcast Encryption
-
Springer
-
J. Baek, R. Safavi-Naini, W. Susilo, "Efficient Multi- Receiver Identity-Based Encryption and Its Application to Broadcast Encryption," Lecture Notes in Computer Science (LNCS), Springer, 2005, Vol. 3386, pp. 380-397.
-
(2005)
Lecture Notes in Computer Science (LNCS)
, vol.3386
, pp. 380-397
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
8
-
-
38049001725
-
-
Technical Report, C.M.U
-
J. Bethencourt, H. Chan, A. Perrig, E. Shi, D. Song. Anonymous Multi-Attribute Encryption with Range Query and Conditional Decryption. Technical Report, C.M.U, 2006.
-
(2006)
Anonymous Multi-Attribute Encryption with Range Query and Conditional Decryption
-
-
Bethencourt, J.1
Chan, H.2
Perrig, A.3
Shi, E.4
Song, D.5
-
9
-
-
24144434019
-
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
-
Springer
-
T. H. Yuen, V. K. Wei, "Fast and Proven Secure Blind Identity-Based Signcryption from Pairings," Lecture Notes in Computer Science (LNCS), Springer, 2005, Vol. 3376, pp. 305-322.
-
(2005)
Lecture Notes in Computer Science (LNCS)
, vol.3376
, pp. 305-322
-
-
Yuen, T.H.1
Wei, V.K.2
-
10
-
-
26444440344
-
Secure encryption Where Group Manager Members Open Authority Are Identity-Based
-
Springer
-
V. K. Wei, T. H. Yuen, F. Zhang, "Secure encryption Where Group Manager Members Open Authority Are Identity-Based," Lecture Notes in Computer Science (LNCS), Springer, 2005, Vol. 3574, pp. 468-480.
-
(2005)
Lecture Notes in Computer Science (LNCS)
, vol.3574
, pp. 468-480
-
-
Wei, V.K.1
Yuen, T.H.2
Zhang, F.3
|