-
1
-
-
0344196671
-
Sequen-tial key derivation patterns for broadcast encryption and key predistribution schemes
-
LNCS 2894 Springer-Verlag 2003
-
N. Attrapadung, K. Kobara, and H. Imai, "Sequen-tial key derivation patterns for broadcast encryption and key predistribution schemes", Asiacrypt 2003, LNCS 2894, pp. 374-391, Springer-Verlag, 2003.
-
(2003)
Asiacrypt
, pp. 374-391
-
-
Attrapadung, N.1
Kobara, K.2
Imai, H.3
-
2
-
-
34547348650
-
ID-based ring signature and proxy ring signature schemes from bilinear pairings
-
Mar
-
A. K Awasthi and S. Lal, "ID-based ring signature and proxy ring signature schemes from bilinear pairings", International Journal of Network Security, vol. 4, no. 2, pp. 187-192, Mar. 2007.
-
(2007)
International Journal of Network Security
, vol.4
, Issue.2
, pp. 187-192
-
-
Awasthi, A.K.1
Lal, S.2
-
3
-
-
24144432124
-
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
-
2005 LNCS 3386 Springer-Verlag Berlin
-
J. Baek, R. Safavi-Naini, and W. Susilo, "Efficient multi-receiver identity-based encryption and its application to broadcast encryption", PKC 2005, LNCS 3386, pp. 380-397, Springer-Verlag, Berlin, 2005.
-
(2005)
PKC
, pp. 380-397
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
4
-
-
35048841300
-
Efficient selective-ID identity based encryption without random oracles
-
LNCS, Springer-Verlag Berlin
-
D. Boneh, and X. Boyen, "Efficient selective-ID identity based encryption without random oracles", Eurocrypt 2004, LNCS 3027, pp. 223-238, Springer-Verlag, Berlin, 2004.
-
(2004)
Eurocrypt 2004
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
5
-
-
35048835319
-
Secure identity based encryption without random oracles
-
LNCS 3152 Springer-Verlag, Berlin
-
D. Boneh, and X. Boyen, "Secure identity based encryption without random oracles", Crypto 2004, LNCS 3152, pp. 443-459, Springer-Verlag, Berlin, 2004.
-
(2004)
Crypto 2004
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
6
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
LNCS 2139 Springer-Verlag Berlin
-
D. Boneh, and M. Franklin, "Identity-based encryption from the Weil pairing", Crypto 2001, LNCS 2139, pp. 213-229, Springer-Verlag, Berlin, 2001.
-
(2001)
Crypto 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
LNCS 3621 Springer-Verlag Berlin
-
D. Boneh, C. Gentry, and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys", Crypto 2005, LNCS 3621, pp. 258-275, Springer-Verlag, Berlin, 2005.
-
(2005)
Crypto 2005
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
8
-
-
35248897599
-
A Forward-Secure Public-Key Encryption Scheme
-
LNCS 2656 Springer-Verlag Berlin
-
R. Canetti, S. Halevi, and J. Katz, "A Forward-Secure Public-Key Encryption Scheme", Eurocrypt 2003, LNCS 2656, pp. 255-271, Springer-Verlag, Berlin, 2003.
-
(2003)
Eurocrypt 2003
, pp. 255-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
9
-
-
38149117029
-
Identity-based broadcast encryption with constant size ciphertexts and private keys
-
LNCS 4833 Springer-Verlag Berlin
-
C. Delerablée, "Identity-based broadcast encryption with constant size ciphertexts and private keys", Asiacrypt 2007, LNCS 4833, pp. 200-215, Springer-Verlag, Berlin, 2007.
-
(2007)
Asiacrypt 2007
, pp. 200-215
-
-
Delerablée, C.1
-
10
-
-
38149121099
-
Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
-
LNCS 4575 Springer-Verlag Berlin
-
C. Delerablée, P. Paillier, and D. Pointcheval, "Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys", PAIRING 2007, LNCS 4575, pp. 39-59, Springer-Verlag, Berlin, 2007.
-
(2007)
PAIRING 2007
, pp. 39-59
-
-
Delerablée, C.1
Paillier, P.2
Pointcheval, D.3
-
11
-
-
35248901924
-
Public key broadcast encryption for stateless receivers
-
LNCS Springer-Verlag, Berlin
-
Y. Dodis, and N. Fazio, "Public key broadcast encryption for stateless receivers", ACM DRM 2002, LNCS 2696, pp. 61-80, Springer-Verlag, Berlin, 2003.
-
(2003)
ACM DRM 2002
, vol.2696
, pp. 61-80
-
-
Dodis, Y.1
Fazio, N.2
-
12
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithm
-
T. ElGamal, "A public-key cryptosystem and a signature scheme based on discrete logarithm", IEEE Transactions on Informtion Theory, vol. 31, no. 4, pp. 469-472, 1985.
-
(1985)
IEEE Transactions on Informtion Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
13
-
-
84979291225
-
Broadcast encryption
-
LNCS 773 Springer-Verlag Berlin
-
A. Fiat, and M. Naor, "Broadcast encryption", Crypto 1993, LNCS 773, pp. 480-491, Springer-Verlag, Berlin, 1994.
-
(1994)
Crypto 1993
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
14
-
-
33746062799
-
Practical Identity-based encryption without random oracles
-
LNCS 4004 Springer-Verlag Berlin
-
C. Gentry, "Practical Identity-based encryption without random oracles", Eurocrypt 2006, LNCS 4004, pp. 445-464, Springer-Verlag, Berlin, 2006.
-
(2006)
Eurocrypt 2006
, pp. 445-464
-
-
Gentry, C.1
-
15
-
-
24944584332
-
Efficient tree-based revocation in groups of low-state devices
-
LNCS 3152 Springer-Verlag Berlin
-
M. T. Goodrich, J. Z. Sun, and R. Tamassia, "Efficient tree-based revocation in groups of low-state devices", Crypto 2004, LNCS 3152, pp. 511-527, Springer-Verlag, Berlin, 2004.
-
(2004)
Crypto 2004
, pp. 511-527
-
-
Goodrich, M.T.1
Sun, J.Z.2
Tamassia, R.3
-
16
-
-
84937435227
-
The LSD broadcast en-cryption scheme
-
LNCS 2442 Springer-Verlag Berlin
-
D. Halevy, and A. Shamir, "The LSD broadcast en-cryption scheme", Crypto 2002, LNCS 2442, pp. 47-60, Springer-Verlag, Berlin, 2002.
-
(2002)
Crypto 2002
, pp. 47-60
-
-
Halevy, D.1
Shamir, A.2
-
17
-
-
58449125766
-
Efficient dynamic broadcast encryption and its extension to authenticated dynamic broadcast encryption
-
LNCS 5339 Springer-Verlag Berlin
-
M. Kusakawa, H. Hiwatari, T. Asano, S. Matsuda, "Efficient dynamic broadcast encryption and its extension to authenticated dynamic broadcast encryption", CANS 2008, LNCS 5339, pp. 31-48, Springer-Verlag, Berlin, 2008.
-
(2008)
CANS 2008
, pp. 31-48
-
-
Kusakawa, M.1
Hiwatari, H.2
Asano, T.3
Matsuda, S.4
-
19
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
LNCS 2139 Springer-Verlag Berlin
-
D. Naor, M. Naor, and J. Lotspiech, "Revocation and tracing schemes for stateless receivers", Crypto 2001, LNCS 2139, pp. 41-62, Springer-Verlag, Berlin, 2001.
-
(2001)
Crypto 2001
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
20
-
-
50549101800
-
Public key broadcast encryption schemes with shorter transmissions
-
J.H. Park, H.J. Kim, M.H. Sung and D.H. Lee, "Public key broadcast encryption schemes with shorter transmissions", IEEE Transactions on Broadcasting, Vol. 54, No. 3, pp. 401-411, 2008.
-
(2008)
IEEE Transactions on Broadcasting
, vol.54
, Issue.3
, pp. 401-411
-
-
Park, J.H.1
Kim, H.J.2
Sung, M.H.3
Lee, D.H.4
-
21
-
-
2342652200
-
Tam-per Resistance Mechanisms for Secure, Embedded Systems
-
IEEE Computer Society, Washington DC
-
S. Ravi, A. Raghunathan, and S. Chakradhar, "Tam-per Resistance Mechanisms for Secure, Embedded Systems", Proceedings of the 17th international Conference on VLSI Design (VLSID 2004), pp. 605-611, IEEE Computer Society, Washington, DC, 2004.
-
(2004)
Proceedings of the 17th international Conference on VLSI Design (VLSID 2004)
, pp. 605-611
-
-
Ravi, S.1
Raghunathan, A.2
Chakradhar, S.3
-
22
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
24
-
-
85020598353
-
Identity-based cryptosystems and signa-ture schemes
-
LNCS 196 Springer-Verlag Berlin
-
A. Shamir, "Identity-based cryptosystems and signa-ture schemes", Crypto 1984, LNCS 196, pp. 47-53, Springer-Verlag, Berlin, 1985.
-
(1985)
Crypto 1984
, pp. 47-53
-
-
Shamir, A.1
-
25
-
-
24944566040
-
Efficient identity-based encryption with-out random oracles
-
LNCS 3494 Springer-Verlag Berlin.
-
B.Waters, "Efficient identity-based encryption with-out random oracles", Eurocrypt 2005, LNCS 3494, pp. 114-127, Springer-Verlag, Berlin, 2005.
-
(2005)
Eurocrypt 2005
, pp. 114-127
-
-
Waters, B.1
-
26
-
-
80054088754
-
General group oriented ID-based cryptosystems with chosen plaintext security
-
Jan
-
C. Xu, J. Zhou, and G. Xiao, "General group oriented ID-based cryptosystems with chosen plaintext security", International Journal of Network Security, vol. 6, no. 1, pp. 1-5, Jan. 2008.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.1
, pp. 1-5
-
-
Xu, C.1
Zhou, J.2
Xiao, G.3
-
27
-
-
80053609880
-
A traitor tracing scheme based on the RSA system
-
Sept
-
B. Yang, H. Ma, and S. Zhu, "A traitor tracing scheme based on the RSA system", International Journal of Network Security, vol. 5, no. 2, pp. 182-186, Sept. 2007.
-
(2007)
International Journal of Network Security
, vol.5
, Issue.2
, pp. 182-186
-
-
Yang, B.1
Ma, H.2
Zhu, S.3
-
28
-
-
80054058425
-
ID-based weak blind signature from bilinear pairings
-
Sept. 2007
-
Z. M. Zhao, "ID-based weak blind signature from bilinear pairings", International Journal of Network Security, vol. 7, no. 2, pp. 265-268, Sept. 2008.
-
(2008)
International Journal of Network Security
, vol.5
, Issue.2
, pp. 265-268
-
-
Zhao, Z.M.1
|