-
3
-
-
45749146255
-
Traceable and retrievable identity-based encryption
-
Springer-Verlag
-
M.-H. Au, Q. Huang, J.-K. Liu, W. Susilo, D.-S. Wong, and G. Yang Traceable and retrievable identity-based encryption ACNS 2008, vol. 5037 of Lecture Notes in Computer Science 2008 Springer-Verlag 94 110
-
(2008)
ACNS 2008, Vol. 5037 of Lecture Notes in Computer Science
, pp. 94-110
-
-
Au, M.-H.1
Huang, Q.2
Liu, J.-K.3
Susilo, W.4
Wong, D.-S.5
Yang, G.6
-
6
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
D. Boneh, X. Boyen, and E. Goh Hierarchical identity based encryption with constant size ciphertext EUROCRYPT 2005, vol. 3493 of Lecture Notes in Computer Science 2005 Springer-Verlag 440 456 (Pubitemid 41313968)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
7
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh, and M. Franklin Identity-based encryption from the weil pairing CRYPTO 2001, vol. 2139 of Lecture Notes in Computer Science 2001 Springer-Verlag 213 229 (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh, and M. Franklin Identity-based encryption from the weil pairing SIAM Journal of Computing 32 3 2003 586 615
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
10
-
-
24144453101
-
Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
-
Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
-
D. Boneh, and J. Katz Improved efficiency for cca-secure cryptosystems built using identity based encryption CT-RSA 2005, vol. 3376 of Lecture Notes in Computer Science 2005 Springer-Verlag 87 103 (Pubitemid 41235422)
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 87-103
-
-
Boneh, D.1
Katz, J.2
-
12
-
-
67049154036
-
Removing escrow from identity-based encryption
-
S. Jarecki, G. Tsudik, Springer-Verlag
-
S.S.M. Chow Removing escrow from identity-based encryption S. Jarecki, G. Tsudik, PKC 2009, vol. 5443 of Lecture Notes in Computer Science 2009 Springer-Verlag 256 276
-
(2009)
PKC 2009, Vol. 5443 of Lecture Notes in Computer Science
, pp. 256-276
-
-
Chow, S.S.M.1
-
13
-
-
38149117029
-
Identity-based broadcast encryption with constant size ciphertexts and private keys
-
Springer-Verlag
-
C. Delerablée Identity-based broadcast encryption with constant size ciphertexts and private keys ASIACRYPT 2007, vol. 4833 of Lecture Notes in Computer Science 2007 Springer-Verlag 200 215
-
(2007)
ASIACRYPT 2007, Vol. 4833 of Lecture Notes in Computer Science
, pp. 200-215
-
-
Delerablée, C.1
-
14
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
E. Biham, Springer-Verlag
-
C. Gentry Certificate-based encryption and the certificate revocation problem E. Biham, EUROCRYPT 2003, vol. 2656 of Lecture Notes in Computer Science 2003 Springer-Verlag 272 293
-
(2003)
EUROCRYPT 2003, Vol. 2656 of Lecture Notes in Computer Science
, pp. 272-293
-
-
Gentry, C.1
-
18
-
-
70349289356
-
Black-box accountable authority identity based encryption
-
V. Goyal, S. Lu, A. Sahai, and B. Waters Black-box accountable authority identity based encryption ACM-CCS 2008 2008 427 436
-
(2008)
ACM-CCS 2008
, pp. 427-436
-
-
Goyal, V.1
Lu, S.2
Sahai, A.3
Waters, B.4
-
19
-
-
58349096483
-
Identity-based broadcast encryption scheme with untrusted pkg
-
IEEE Computer Society
-
S. Guo, and C. Zhang Identity-based broadcast encryption scheme with untrusted pkg ICYCS 2008 2008 IEEE Computer Society 1613 1618
-
(2008)
ICYCS 2008
, pp. 1613-1618
-
-
Guo, S.1
Zhang, C.2
-
20
-
-
84988273293
-
Multi-authority ciphertext-policy attribute-based encryption with accountability
-
ACM New York, NY, USA
-
J. Li, Q. Huang, X. Chen, S.S.M. Chow, D.S. Wong, and D. Xie Multi-authority ciphertext-policy attribute-based encryption with accountability ASIACCS 2011 2011 ACM New York, NY, USA 386 390
-
(2011)
ASIACCS 2011
, pp. 386-390
-
-
Li, J.1
Huang, Q.2
Chen, X.3
Chow, S.S.M.4
Wong, D.S.5
Xie, D.6
-
21
-
-
67049119914
-
Towards black-box accountable authority IBE with short ciphertexts and private keys
-
Springer-Verlag
-
B. Libert, and D. Vergnaud Towards black-box accountable authority IBE with short ciphertexts and private keys PKC 2009, vol. 5443 of Lecture Notes in Computer Science 2009 Springer-Verlag 235 255 http://www.dice.ucl.ac.be/~libert/ accountable-IBE-full.pdf
-
(2009)
PKC 2009, Vol. 5443 of Lecture Notes in Computer Science
, pp. 235-255
-
-
Libert, B.1
Vergnaud, D.2
-
22
-
-
24944554962
-
Fuzzy identity-based encryption
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
A. Sahai, and B. Waters Fuzzy identity-based encryption EUROCRYPT 2005, vol. 3494 of Lecture Notes in Computer Science 2005 Springer-Verlag 457 473 (Pubitemid 41313969)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
26
-
-
24944566040
-
Efficient Identity-Based Encryption without random oracles
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
B. Waters Efficient identity-based encryption without random oracles EUROCRYPT 2005, vol. 3494 of Lecture Notes in Computer Science 2005 Springer-Verlag 114 127 (Pubitemid 41313949)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 114-127
-
-
Waters, B.1
|