-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir. Identity-based cryptosystems and signature schemes. In In Advances in Cryptology - Crypto '84, volume 196, pages 47-53, 1984.
-
(1984)
In Advances in Cryptology - Crypto '84
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
84979291225
-
Broadcast encryption
-
Fiat. A. and Naor. M. Broadcast encryption. In CRYPTO 1993, LNCS, volume 773, pages 480-491, 1994.
-
(1994)
CRYPTO 1993, LNCS
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
3
-
-
38149117029
-
Identity-based broadcast encryption with constant size ciphertext and priavate keys
-
Cecile Delerablee. Identity-based broadcast encryption with constant size ciphertext and priavate keys. Lecture Notes in Computer Science, Springer-Verlag, 4833:200-215, 2007.
-
(2007)
Lecture Notes in Computer Science, Springer-Verlag
, vol.4833
, pp. 200-215
-
-
Delerablee, C.1
-
4
-
-
24144432124
-
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
J. Baek, R. Safavi-Naini, and W. Susilo. Efficient multi-receiver identity-based encryption and its application to broadcast encryption. Proc. of International Workshop on Practice and Theory in Public Key Cryptography, pages 380-397, 2005. (Pubitemid 41231344)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 380-397
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
5
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
D.Boneh, C.Gentry, and B.Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In CRYPTO 2005, pages 258-275, 2005. (Pubitemid 43902118)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
7
-
-
84947723598
-
Distributed Signcryption
-
Progress in Cryptology - INDOCRYPT 2000
-
Yi Mu and Vijay Varadharajan. Distributed signcryption. In Proceedings of the First International Conference on Progress in Cryptology, pages 155-164, 2000. ISBN 3-540-41452-5. (Pubitemid 33210847)
-
(2000)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1977
, pp. 155-164
-
-
Mu, Y.1
Varadharajan, V.2
-
8
-
-
79951861361
-
Efficient and provably secure multi-recipient signcryption from bilinear pairings
-
Fagen Li, Yupu Hu, and Shuanggen Liu. Efficient and provably secure multi-recipient signcryption from bilinear pairings. In Cryptology ePrint Archive, Report 2006/238, 2006.
-
(2006)
Cryptology EPrint Archive, Report 2006/238
-
-
Li, F.1
Hu, Y.2
Liu, S.3
-
9
-
-
38049178938
-
How to signcrypt a message to designated group
-
Chun bo MA, Jun AO, and Jian hua LI. How to signcrypt a message to designated group. The Journal of China Universities of Posts and Telecommunications, 14(4):57-63, 2007.
-
(2007)
The Journal of China Universities of Posts and Telecommunications
, vol.14
, Issue.4
, pp. 57-63
-
-
Ma, C.B.1
Ao, J.2
Li, J.H.3
-
12
-
-
72749111135
-
On the security of provably secure multi-receiver id-based signcryption scheme
-
ISSN 0916-8508
-
Chik-How Tan. On the security of provably secure multi-receiver id-based signcryption scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., E91-A(7):1836-1838, 2008. ISSN 0916-8508.
-
(2008)
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
, vol.E91-A
, Issue.7
, pp. 1836-1838
-
-
Tan, C.-H.1
-
14
-
-
38049033337
-
Efficient identity-based signcryption scheme for multiple receivers
-
Y. Yu, B. Yang, X. Y. Huang, and M. W. Zhang. Efficient identity-based signcryption scheme for multiple receivers. Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 4610:13-21, 2007.
-
(2007)
Lecture Notes in Computer Science, Springer Berlin/Heidelberg
, vol.4610
, pp. 13-21
-
-
Yu, Y.1
Yang, B.2
Huang, X.Y.3
Zhang, M.W.4
-
16
-
-
77956318476
-
An efficient identity-based signcryption scheme for multiple receivers
-
S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, and Chandrasekaran Pandu Rangan. An efficient identity-based signcryption scheme for multiple receivers. In Proceedings of the 4th International Workshop on Security, pages 71-88, 2009.
-
(2009)
Proceedings of the 4th International Workshop on Security
, pp. 71-88
-
-
Selvi, S.S.D.1
Vivek, S.S.2
Srinivasan, R.3
Rangan, C.P.4
-
19
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Dan Boneh, Xavier Boyen, and Eu-Jin Goh. Hierarchical identity based encryption with constant size ciphertext. Advances in Cryptology - EUROCRYPT 2005, 3494/2005:440-456, 2005. (Pubitemid 41313968)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
20
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
David Pointcheval and Jacques Stern. Security arguments for digital signatures and blind signatures. JOURNAL OF CRYPTOLOGY, 13:361-396, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
21
-
-
79951885158
-
-
http://crypto.stanford.edu/pbc/.
-
-
-
|