-
1
-
-
84979291225
-
Broadcast encryption
-
A. Fiat, M. Naor, Broadcast encryption, in: Proc. CRYPTO 1993, LNCS 773, 1993, pp. 480-491.
-
(1993)
Proc. CRYPTO 1993, LNCS 773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
2
-
-
0001720832
-
Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution
-
PII S0304397597000024
-
C. Blundo, Luiz A. Frota Mattos, and D.R. Stinson Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution Theoretical Computer Science 200 1998 313 334 (Pubitemid 128450821)
-
(1998)
Theoretical Computer Science
, vol.200
, Issue.1-2
, pp. 313-334
-
-
Blundo, C.1
Frota Mattos, L.A.2
Stinson, D.R.3
-
3
-
-
0005053804
-
Some new results on key distribution patterns and broadcast encryption
-
D.R. Stinson, and T.V. Trung Some new results on key distribution patterns and broadcast encryption Designs, Codes and Cryptography 14 1998 261 279 (Pubitemid 128507645)
-
(1998)
Designs, Codes, and Cryptography
, vol.14
, Issue.3
, pp. 261-279
-
-
Stinson, D.R.1
Van Trung, T.2
-
5
-
-
24144432124
-
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
-
J. Baek, R. Safavi-Naini, W. Susilo, Efficient multi-receiver identity-based encryption and its application to broadcast encryption, in: Proc. PKC 2005, LNCS 3386, 2005, pp. 23-26.
-
(2005)
Proc. PKC 2005, LNCS 3386
, pp. 23-26
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
6
-
-
33646823652
-
Efficient identity-based key encapsulation to multiple parties
-
DOI 10.1007/11586821-28, Cryptography and Coding - 10th IMA International Conference, Proceedings
-
M. Barbosa, P. Farshim, Efficient identity-based key encapsulation to multiple parties, in: Proc. IMA Int. Conf., LNCS 3796, 2005, pp. 428-441. (Pubitemid 43774849)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3796
, pp. 428-441
-
-
Barbosa, M.1
Farshim, P.2
-
7
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh, M.K. Franklin, Identity-based encryption from the weil pairing, in: Proc. CRYPTO 2001, LNCS 2139, 2001, pp. 213-229. (Pubitemid 33317917)
-
(2001)
Lecture Notes In Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
85025586099
-
Multi-receiver identity-based key encapsulation with shortened ciphertext
-
S. Chatterjee, P. Sarkar, Multi-receiver identity-based key encapsulation with shortened ciphertext, in: Proc. INDOCRYPT 2006, LNCS 4329, 2006, pp. 394-408.
-
(2006)
Proc. INDOCRYPT 2006, LNCS 4329
, pp. 394-408
-
-
Chatterjee, S.1
Sarkar, P.2
-
9
-
-
38049061158
-
Generalized key delegation for hierarchical identity-based encryption
-
M. Abdalla, E. Kiltz, G. Neven, Generalized key delegation for hierarchical identity-based encryption, in: Proc. ESORICS 2005, LNCS 4734, 2005, pp. 139-154.
-
(2005)
Proc. ESORICS 2005, LNCS 4734
, pp. 139-154
-
-
Abdalla, M.1
Kiltz, E.2
Neven, G.3
-
10
-
-
38149117029
-
Identity-based broadcast encryption with cosntant size ciphertexts and private keys
-
C. Delerablee, Identity-based broadcast encryption with cosntant size ciphertexts and private keys, in: Proc. ASIACRYPT 2007, LNCS 4833, 2007, pp. 200-215.
-
(2007)
Proc. ASIACRYPT 2007, LNCS 4833
, pp. 200-215
-
-
Delerablee, C.1
-
11
-
-
62649173578
-
Fully CCA2 secure identity-based broadcast encryption without random oracles
-
Y. Ren, and D. Gu Fully CCA2 secure identity-based broadcast encryption without random oracles Information Processing Letters 109 2009 527 533
-
(2009)
Information Processing Letters
, vol.109
, pp. 527-533
-
-
Ren, Y.1
Gu, D.2
-
12
-
-
33749573228
-
Anonymous hierarchical identity-based encryption (Without random oracles)
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
X. Boyen, B. Waters, Anonymous identity-based encryption (without random oracles), in: Proc. CRYPTO 2006, LNCS 4117, 2006, pp. 290-307. (Pubitemid 44532122)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117
, pp. 290-307
-
-
Boyen, X.1
Waters, B.2
-
13
-
-
38149092452
-
Pairing-based onion routing
-
A. Kate, G. Zaverucha, I. Goldberg, Pairing-based onion routing, Proc. Privacy Enhancing Technologies Symposium 2007, LNCS 4776, 2007, pp. 95-112.
-
(2007)
Proc. Privacy Enhancing Technologies Symposium 2007, LNCS 4776
, pp. 95-112
-
-
Kate, A.1
Zaverucha, G.2
Goldberg, I.3
-
14
-
-
84946837370
-
Key-privacy in public-key encryption
-
Advances in Cryptology - ASIACRYPT 2001
-
M. Bellare, A. Boldyreva, A. Desai, D. Pointcheval, Key-privacy in public-key encryption, in: Proc. ASIACRYPT 2001, LNCS 2238, 2001, pp. 566-582. (Pubitemid 33371207)
-
(2002)
Lecture Notes In Computer Science
, Issue.2248
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
15
-
-
82955246861
-
Implementing the tate pairing
-
S.D. Galbraith, K. Harrison, D. Soldera, Implementing the tate pairing, in: Proc. 5th International Symposium on Algorithmic Number Theory, LNCS 2369, 2002, pp. 324-337.
-
(2002)
Proc. 5th International Symposium on Algorithmic Number Theory, LNCS 2369
, pp. 324-337
-
-
Galbraith, S.D.1
Harrison, K.2
Soldera, D.3
-
16
-
-
22144445920
-
The weil pairing, and its efficient calculation
-
DOI 10.1007/s00145-004-0315-8
-
V.S. Miller The weil pairing and its efficient calculation Journal of Cryptology 17 2004 235 261 (Pubitemid 41201458)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 235-261
-
-
Miller, V.S.1
-
17
-
-
23944466280
-
Implementation of tate pairing on hyperelliptic curves of genus 2
-
Y.J. Choie, E. Lee, Implementation of tate pairing on hyperelliptic curves of genus 2, in: Proc. ICISC 2003, LNCS 2971, 2004, pp. 97-111.
-
(2004)
Proc. ICISC 2003, LNCS 2971
, pp. 97-111
-
-
Choie, Y.J.1
Lee, E.2
-
18
-
-
33748598990
-
An efficient identity-based cryptosystem for end-to-end mobile security
-
DOI 10.1109/TWC.2006.1687783, 1687783
-
J. Hwu, R. Chen, and Y. Lin An efficient identity-based cryptosystem for end-to-end mobile security IEEE Transactions on Wireless Communications 5 2006 2586 2593 (Pubitemid 44376172)
-
(2006)
IEEE Transactions on Wireless Communications
, vol.5
, Issue.9
, pp. 2586-2593
-
-
Hwu, J.-S.1
Chen, R.-J.2
Lin, Y.-B.3
-
19
-
-
38049087403
-
Privacy in encrypted content distribution using private broadcast encryption
-
A. Barth, D. Boneh, B. Waters, Privacy in encrypted content distribution using private broadcast encryption, in: Proc. Financial Cryptography, 2006.
-
(2006)
Proc. Financial Cryptography
-
-
Barth, A.1
Boneh, D.2
Waters, B.3
-
20
-
-
0345565893
-
A survey of key management for secure group communication
-
S. Rafaeli, and D. Hutchison A survey of key management for secure group communication ACM Computing Surveys 35 2003 309 329
-
(2003)
ACM Computing Surveys
, vol.35
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
21
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
D. Boneh, C. Gentry, Collusion resistant broadcast encryption with short ciphertexts and private keys, CRYPTO 2005, LNCS 3621, 2005, pp. 258-275. (Pubitemid 43902118)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
25
-
-
84861613165
-
-
accessed 1.04.10
-
Search for Digital IDs (VeriSign). < https://digitalid.verisign.com/ services/client/index.html > (accessed 1.04.10).
-
Search for Digital IDs (VeriSign)
-
-
-
26
-
-
84861613167
-
-
accessed 1.04.10
-
File Encryption (Windows), Microsoft, < http://msdn.microsoft.com/en- us/library/aa364223%28VS.85%29.aspx > (accessed 1.04.10).
-
File Encryption (Windows), Microsoft
-
-
|