-
1
-
-
20444502239
-
An Id-based broadcast encryption scheme for key distribution
-
Du, X., Wang, Y., Ge, J. and Wang, Y. (2005) An Id-based broadcast encryption scheme for key distribution. IEEE Trans. Broadcast., 51, 264-266.
-
(2005)
IEEE Trans. Broadcast.
, vol.51
, pp. 264-266
-
-
Du, X.1
Wang, Y.2
Ge, J.3
Wang, Y.4
-
2
-
-
36348947024
-
Comments on an efficient ID-based broadcast encryption scheme
-
Chien, H.Y. (2007) Comments on an efficient ID-based broadcast encryption scheme. IEEE Trans. Broadcast., 53, 809-810.
-
(2007)
IEEE Trans. Broadcast.
, vol.53
, pp. 809-810
-
-
Chien, H.Y.1
-
3
-
-
33745622143
-
Efficient pubic key broadcast encryption using identifier of receivers
-
2006, Hangzhou, China. Lecture Notes in Computer Science 3903, Springer
-
Lee, J.W., Hwang,Y.H. and Lee, P.J. (2006) Efficient Pubic Key Broadcast Encryption Using Identifier of Receivers. ISPEC 2006, Hangzhou, China. Lecture Notes in Computer Science 3903, pp. 153-164. Springer.
-
(2006)
ISPEC
, pp. 153-164
-
-
Lee, J.W.1
Hwang, Y.H.2
Lee, P.J.3
-
4
-
-
33750089267
-
A new id-based broadcast encryption scheme
-
2006, Wuhan, China. Lecture Notes in Computer Science 4158, Springer
-
Yang, C., Cheng, X., Ma, W. and Wang, X. (2006) A New Id-Based Broadcast Encryption Scheme. Autonomic and Trusted Computing 2006, Wuhan, China. Lecture Notes in Computer Science 4158, pp. 487-492. Springer.
-
(2006)
Autonomic and Trusted Computing
, pp. 487-492
-
-
Yang, C.1
Cheng, X.2
Ma, W.3
Wang, X.4
-
5
-
-
29144440106
-
Efficient identity-based multicast scheme from bilinear pairing
-
Wang, L. andWu, C.-K. (2005) Efficient identity-based multicast scheme from bilinear pairing. IEE Proc. Commun., 152, 877-882.
-
(2005)
IEE Proc. Commun.
, vol.152
, pp. 877-882
-
-
Wang, L.1
Wu, C.-K.2
-
6
-
-
24144432124
-
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
-
2005, Switzerland. Lecture Notes in Computer Science 3386
-
Baek, J., Safavi-Naini, R. and Susilo, W. (2005) Efficient Multi-Receiver Identity-Based Encryption and Its Application to Broadcast Encryption. PKC 2005, Switzerland. Lecture Notes in Computer Science 3386, pp. 380-397.
-
(2005)
PKC
, pp. 380-397
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
7
-
-
66149159191
-
Pairing-based multi-recipient public key encryption
-
Las Vegas, Nevada, USA.
-
Lu, L. and Hu, L. (2006) Pairing-Based Multi-Recipient Public Key Encryption. Proc. 2006 Int. Conf. Security & Management, Las Vegas, Nevada, USA. pp. 159-165.
-
(2006)
Proc. 2006 Int. Conf. Security & Management
, pp. 159-165
-
-
Lu, L.1
Hu, L.2
-
8
-
-
85025586099
-
Multi-Receiver identity-based key encapsulation with shortened ciphertext
-
Kolkata, India. Lecture Notes in Computer Science 4329, Springer
-
Chatterjee, S. and Sarkar, P. (2006) Multi-Receiver Identity-Based Key Encapsulation with Shortened Ciphertext. INDOCRYPT 2006, Kolkata, India. Lecture Notes in Computer Science 4329, pp. 394-408. Springer.
-
(2006)
INDOCRYPT
, vol.2006
, pp. 394-408
-
-
Chatterjee, S.1
Sarkar, P.2
-
9
-
-
77955188662
-
Anonymous multireceiver identity-based encryption
-
Fan, D., Huang, L.Y. and Ho, P.H. (2010) Anonymous multireceiver identity-based encryption. IEEE Trans. Comput., 2010, http://doi. ieeecomputersociety.org/10.1109/TC.2010.23.
-
(2010)
IEEE Trans. Comput.
, vol.2010
-
-
Fan, D.1
Huang, L.Y.2
Ho, P.H.3
-
10
-
-
84859296222
-
-
Eltahawy Mona. Tunisia's Jasmine Revolution.Washington Post. 2011-01-15 [2011-01-15]. (accessed April 18, 2011)
-
Eltahawy, Mona. Tunisia's Jasmine Revolution.Washington Post. 2011-01-15 [2011-01-15]. http://www.washingtonpost.com/ wp-dyn/content/article/2011/01/14/ AR2011011405084.html (accessed April 18, 2011).
-
-
-
-
11
-
-
85020598353
-
Identity based on cryptosystems and signature schemes
-
Barbara, California, USA. Lecture Notes in Computer Science 196, Springer
-
Shamir,A. (1984) Identity Based on Cryptosystems and Signature Schemes. Crypto'84, Barbara, California, USA. Lecture Notes in Computer Science 196, pp. 47-53. Springer.
-
(1984)
Crypto'84
, pp. 47-53
-
-
Shamir, A.1
-
12
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
Boneh, D. and Franklin, M. (2003) Identity-based encryption from the weil pairing. SIAM J. Comput., 32, 586-615.
-
(2003)
SIAM J. Comput.
, vol.32
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
13
-
-
33746062799
-
Practical identity-based encryption without
-
2006, Saint Petersburg, Russia. Lecture Notes in Computer Science 4004
-
Gentry, C. (2006) Practical Identity-Based Encryption Without Random Oracles. Advances in Cryptology -EUROCRYPT 2006, Saint Petersburg, Russia. Lecture Notes in Computer Science 4004, pp. 445-464.
-
(2006)
Random Oracles. Advances in Cryptology -EUROCRYPT
, pp. 445-464
-
-
Gentry, C.1
-
15
-
-
84983062295
-
An ID-based anonymous signcryption scheme for multiple receivers
-
Zhang, B. and Xu, Q. (2010) An ID-based anonymous signcryption scheme for multiple receivers. Int. J. Adv. Sci. Technol., 20, 9-24.
-
(2010)
Int. J. Adv. Sci. Technol.
, vol.20
, pp. 9-24
-
-
Zhang, B.1
Xu, Q.2
-
16
-
-
78651545720
-
Efficient ID-based secure encryption scheme for anonymous receivers
-
Wang, X.,Wang, A.-L. andWang L.Y. (2009) Efficient ID-based secure encryption scheme for anonymous receivers. J. Netw., 4, 641-648.
-
(2009)
J. Netw.
, vol.4
, pp. 641-648
-
-
Wang, X.1
Wang, A.-L.2
Wang, L.Y.3
-
17
-
-
74049086556
-
Efficient privacy of message encryption algorithm for anonymous receivers in E-commerce
-
Tianjin, China.
-
Xu, X.-Y. (2009) Efficient Privacy of Message Encryption Algorithm for Anonymous Receivers in E-commerce. Proc. 2nd Int. Conf. Biomedical Engineering and Informatics 2009, Tianjin, China. pp. 1-4.
-
(2009)
Proc. 2nd Int. Conf. Biomedical Engineering and Informatics
, vol.2009
, pp. 1-4
-
-
Xu, X.-Y.1
-
18
-
-
24144434019
-
Fast and proven secure blind identity-based signcryption from pairings
-
San Francisco, CA, USA. Lecture Notes in Computer Science 3376
-
Yuen, T.H. and Wei, V.K. (2005) Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. CT-RSA 2005, San Francisco, CA, USA. Lecture Notes in Computer Science 3376, pp. 305-322.
-
(2005)
CT-RSA
, vol.2005
, pp. 305-322
-
-
Yuen, T.H.1
Wei, V.K.2
-
19
-
-
46749107236
-
Selectively convertible authenticated encryption in the random oracle model
-
Chien, H.-Y. (2008) Selectively convertible authenticated encryption in the random oracle model. Comput. J., 51, 419-434.
-
(2008)
Comput. J.
, vol.51
, pp. 419-434
-
-
Chien, H.-Y.1
-
20
-
-
33847698965
-
Efficient pairing computation on supersingular abelian varieties
-
Cryptology ePrint Archive: Report 2004/375
-
Barreto, P.S.L.M., Galbraith, S., O'hEigeartaigh, C. and Scott, M. (2007) Efficient pairing computation on supersingular abelian varieties. Des. Codes Cryptogr., 42, 239-271; Cryptology ePrint Archive: Report 2004/375.
-
(2007)
Des. Codes Cryptogr.
, vol.42
, pp. 239-271
-
-
Barreto, P.S.L.M.1
Galbraith, S.2
O'hEigeartaigh, C.3
Scott, M.4
|