-
1
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Advances in Cryptology - EUROCRYPT '98
-
M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography," EUROCRYPT 1998, LNCS, vol.1403, pp.127-144, Springer, 1998. (Pubitemid 128081481)
-
(1998)
Lecture Notes in Computer Science
, Issue.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
2
-
-
84874324906
-
Identity-based encryption from theWeil pairing
-
Springer
-
D. Boneh and M. Franklin, "Identity-based encryption from theWeil pairing," CRYPTO 2001, LNCS, vol.2139, pp.213-229, Springer, 2001.
-
(2001)
CRYPTO 2001, LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
84880897758
-
Universally composable commitments
-
Advances in Cryptology - CRYPTO 2001
-
R. Canetti and M. Fischlin, "Universally composable commitments," CRYPTO 2001, LNCS, vol.2139, pp.19-40, Springer, 2001. (Pubitemid 33317906)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
4
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Springer
-
R. Canetti, S. Halevi, and J. Katz, "Chosen-ciphertext security from identity-based encryption," EUROCRYPT 2004, LNCS, vol.3027, pp.207-222, Springer, 2004.
-
(2004)
EUROCRYPT 2004, LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
5
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Springer
-
E. Fujisaki and T. Okamoto, "Secure integration of asymmetric and symmetric encryption schemes," CRYPTO 1999, LNCS, vol.1666, pp.537-554, Springer, 1999.
-
(1999)
CRYPTO 1999, LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
6
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
Springer
-
C. Gentry, "Certificate-based encryption and the certificate revocation problem," EUROCRYPT 2003, LNCS, vol.2656, pp.272-293, Springer, 2003.
-
(2003)
EUROCRYPT 2003, LNCS
, vol.2656
, pp. 272-293
-
-
Gentry, C.1
-
7
-
-
38049061546
-
Identity-based proxy re-encryption
-
Springer
-
M. Green and G. Ateniese, "Identity-based proxy re-encryption," ACNS 2007, LNCS, vol.4521, pp.288-306, Springer, 2007.
-
(2007)
ACNS 2007, LNCS
, vol.4521
, pp. 288-306
-
-
Green, M.1
Ateniese, G.2
-
8
-
-
0030687206
-
Proxy cryptosystem: Delegation of the power to decrypt ciphertexts
-
Jan.
-
M. Mambo and E. Okamoto, "Proxy cryptosystem: Delegation of the power to decrypt ciphertexts," IEICE Trans. Fundamentals, vol.E80-A, no.1, pp.54-63, Jan. 1997.
-
(1997)
IEICE Trans. Fundamentals
, vol.E80-A
, Issue.1
, pp. 54-63
-
-
Mambo, M.1
Okamoto, E.2
-
9
-
-
50049099260
-
Proxy re-encryption systems for identity-based encryption
-
Springer
-
T. Matsuo, "Proxy re-encryption systems for identity-based encryption," Pairing 2007, LNCS, vol.4575, pp.247-267, Springer, 2007.
-
(2007)
Pairing 2007, LNCS
, vol.4575
, pp. 247-267
-
-
Matsuo, T.1
-
10
-
-
84860368738
-
Delegation decryption
-
Springer
-
Y. Mu, V. Varadharajan, and K.Q. Nguyen, "Delegation decryption," IMA-Crypto & Coding'99, LNCS, vol.1746, pp.258-269, Springer, 1999
-
(1999)
IMA-Crypto & Coding'99, LNCS
, vol.1746
, pp. 258-269
-
-
Mu, Y.1
Varadharajan, V.2
Nguyen, K.Q.3
-
11
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer
-
A. Shamir, "Identity-based cryptosystems and signature schemes," CRYPTO 1984, LNCS, vol.196, pp.47-53, Springer, 1985.
-
(1985)
CRYPTO 1984, LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
12
-
-
38349068669
-
A certificate-based proxy cryptosystem with revocable proxy decryption power
-
Springer
-
L. Wang, J. Shao, Z. Cao, M. Mambo, and A. Yamamura, "A certificate-based proxy cryptosystem with revocable proxy decryption power," INDOCRYPT 2007, LNCS, vol.4859, pp.297-311, Springer, 2007.
-
(2007)
INDOCRYPT 2007, LNCS
, vol.4859
, pp. 297-311
-
-
Wang, L.1
Shao, J.2
Cao, Z.3
Mambo, M.4
Yamamura, A.5
-
13
-
-
78650889838
-
Identity-based proxy cryptosystems with revocability and hierarchical confidentialities
-
Springer
-
L. Wang, L. Wang, M. Mambo, and E. Okamoto, "Identity-based proxy cryptosystems with revocability and hierarchical confidentialities," ICICS 2010, LNCS, vol.6476, pp.383-400, Springer, 2010.
-
(2010)
ICICS 2010, LNCS
, vol.6476
, pp. 383-400
-
-
Wang, L.1
Wang, L.2
Mambo, M.3
Okamoto, E.4
-
14
-
-
78650288030
-
New identitybased proxy re-encryption schemes to prevent collusion attacks
-
Springer
-
L. Wang, L. Wang, M. Mambo, and E. Okamoto, "New identitybased proxy re-encryption schemes to prevent collusion attacks," Pairing 2010, LNCS, vol.6487, pp.327-346, Springer, 2010.
-
(2010)
Pairing 2010, LNCS
, vol.6487
, pp. 327-346
-
-
Wang, L.1
Wang, L.2
Mambo, M.3
Okamoto, E.4
-
15
-
-
24944566040
-
Efficient Identity-Based Encryption without random oracles
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
B. Waters, "Efficient identity-based encryption without random oracles," EUROCRYPT 2005, LNCS, vol.3494, pp.114-127, Springer, 2005. (Pubitemid 41313949)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 114-127
-
-
Waters, B.1
|