-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir. Identity-based cryptosystems and signature schemes. In: Proc. of CRYPTO'84, LNCS, 196, 1984, pp. 47-53.
-
(1984)
Proc. of CRYPTO'84, LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
D. Boneh, M. Franklin. Identity-based encryption from the Weil pairing. In: Proc. of CRYPTO'01, LNCS, 2139, 2001, pp. 213-229.
-
(2001)
Proc. of CRYPTO'01, LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
J. C. Cha, J. H. Cheon. An identity-based signature from gap Diffie-Hellman groups. In: Proc. of PKC'03, LNCS, 2567, 2003, pp. 18-30.
-
(2003)
Proc. of PKC'03, LNCS
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
4
-
-
64249165649
-
Security proofs for identity-based identification and signature schemes
-
M. Bellare, C. Namprempre, G. Neven. Security proofs for identity-based identification and signature schemes. Journal of Cryptology, 2009, Vol. 22, No. 1, pp. 1-61.
-
(2009)
Journal of Cryptology
, vol.22
, Issue.1
, pp. 1-61
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
-
5
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
B. Waters. Efficient identity-based encryption without random oracles. In: Proceedings of Eurocrypt'05, LNCS, 2005, Vol. 3494, pp. 114-127.
-
(2005)
Proceedings of Eurocrypt'05, LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
6
-
-
34347393777
-
Identity-based key agreement protocols from pairings
-
L. Chen, Z. Cheng, N.P. Smart. Identity-based key agreement protocols from pairings. International Journal of Information Security, 2007, Vol. 6, No. 4, pp. 213-241.
-
(2007)
International Journal of Information Security
, vol.6
, Issue.4
, pp. 213-241
-
-
Chen, L.1
Cheng, Z.2
Smart, N.P.3
-
7
-
-
58349086247
-
Generalized identity based and broadcast encryption schemes
-
D. Boneh, M. Hamburg. Generalized identity based and broadcast encryption schemes. In: Proc. of Asiacrypt'08, LNCS, 5350, 2008, pp. 455-470.
-
(2008)
Proc. of Asiacrypt'08, LNCS
, vol.5350
, pp. 455-470
-
-
Boneh, D.1
Hamburg, M.2
-
8
-
-
84859161671
-
Towards generalized ID-based user authentication for mobile multi-server environment
-
Y. H. Chuang, Y. M. Tseng. Towards generalized ID-based user authentication for mobile multi-server environment. International Journal of Communication Systems, 2012, Vol. 25, No. 4, pp. 447-460.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.4
, pp. 447-460
-
-
Chuang, Y.H.1
Tseng, Y.M.2
-
9
-
-
84872251767
-
A verifiable proxy signature scheme based on bilinear pairings with identity-based cryptographic approaches
-
Y. F. Chang, W. L. Tai, C. Y. Lin. A verifiable proxy signature scheme based on bilinear pairings with identity-based cryptographic approaches. Information Technology and Control, 2012, Vol.41, No. 1, pp. 60-68.
-
(2012)
Information Technology and Control
, vol.41
, Issue.1
, pp. 60-68
-
-
Chang, Y.F.1
Tai, W.L.2
Lin, C.Y.3
-
10
-
-
77955703761
-
An ID-based mutual authentication and key exchange protocol for low-power mobile devices
-
T. Y. Wu, Y. M. Tseng. An ID-based mutual authentication and key exchange protocol for low-power mobile devices. The Computer Journal, 2010, Vol. 53, No. 7, pp. 1062-1070.
-
(2010)
The Computer Journal
, vol.53
, Issue.7
, pp. 1062-1070
-
-
Wu, T.Y.1
Tseng, Y.M.2
-
11
-
-
84855277570
-
An efficient and secure identity-based strong designated verifier signature scheme
-
E. J. Yoon. An efficient and secure identity-based strong designated verifier signature scheme. Information Technology and Control, 2011, Vol.40, No. 4, pp. 323-329.
-
(2011)
Information Technology and Control
, vol.40
, Issue.4
, pp. 323-329
-
-
Yoon, E.J.1
-
12
-
-
84863643575
-
Towards ID-based authenticated group key exchange protocol with identifying malicious participants
-
T. Y. Wu, Y. M. Tseng. Towards ID-based authenticated group key exchange protocol with identifying malicious participants. Informatica, 2012, Vol. 23, No. 2, pp. 315-334.
-
(2012)
Informatica
, vol.23
, Issue.2
, pp. 315-334
-
-
Wu, T.Y.1
Tseng, Y.M.2
-
13
-
-
84863621901
-
A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants
-
T. Y. Wu, Y. M. Tseng, T. T. Tsai. A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants. Computer Networks, 2012, 56 (12), 2994-3006.
-
(2012)
Computer Networks
, vol.56
, Issue.12
, pp. 2994-3006
-
-
Wu, T.Y.1
Tseng, Y.M.2
Tsai, T.T.3
-
14
-
-
0011255177
-
Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile
-
R. Housley, W. Polk, W. Ford, D. Solo. Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. In: RFC 3280, IETF, 2002.
-
(2002)
RFC 3280, IETF
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
16
-
-
35248897599
-
A forward-secure public-key encryption scheme
-
R. Canetti, S. Halevi, J. Katz. A forward-secure public-key encryption scheme. In: Proceedings of Eurocrypt'03, LNCS, 2656, 2003, pp. 255-271.
-
(2003)
Proceedings of Eurocrypt'03, LNCS
, vol.2656
, pp. 255-271
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
17
-
-
67650112905
-
Adaptive-ID secure revocable identity-based encryption
-
B. Libert, D. Vergnaud. Adaptive-ID secure revocable identity-based encryption. In: Proceedings ofCT-RSA'09, LNCS, 5473, 2009, pp. 1-15.
-
(2009)
Proceedings OfCT-RSA'09, LNCS
, vol.5473
, pp. 1-15
-
-
Libert, B.1
Vergnaud, D.2
-
18
-
-
84859342049
-
Efficient revocable ID-based encryption with a public channel
-
Y. M. Tseng, T. T. Tsai. Efficient revocable ID-based encryption with a public channel. The Computer Journal, 2012, Vol. 55, No. 4, pp. 475-486.
-
(2012)
The Computer Journal
, vol.55
, Issue.4
, pp. 475-486
-
-
Tseng, Y.M.1
Tsai, T.T.2
-
19
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
D. Boneh, M. Franklin. Identity-based encryption from the Weil pairing. SIAM J. of Computing, 2003, Vol. 32, No. 3, pp. 586-615.
-
(2003)
SIAM J. of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
20
-
-
24144432124
-
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
-
J. Baek, R. Safavi-Naini, W. Susilo. Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In: Proceedings of'PKC'05, LNCS, 3386, 2005, pp. 380-397.
-
(2005)
Proceedings Of'PKC'05, LNCS
, vol.3386
, pp. 380-397
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
21
-
-
35048840186
-
Identity-based threshold decryption
-
J. Baek, Y. Zheng. Identity-based threshold decryption. In: Proceedings ofPKC'04, LNCS, 2947, 2004, pp. 262-276.
-
(2004)
Proceedings OfPKC'04, LNCS
, vol.2947
, pp. 262-276
-
-
Baek, J.1
Zheng, Y.2
-
22
-
-
33645585449
-
ID-based cryptosystems with pairing on elliptic curve
-
Report 2003/054
-
R. Sakai, M. Kasahara. ID-based cryptosystems with pairing on elliptic curve. In: Cryptology ePrint Archive, 2003, Report 2003/054.
-
(2003)
Cryptology EPrint Archive
-
-
Sakai, R.1
Kasahara, M.2
-
23
-
-
53249117524
-
Pairings for cryptographers
-
S. Galbraith, K. Paterson, N.P. Smart. Pairings for cryptographers. Discrete Applied Mathematics, 2008, Vol. 156, No. 16, pp. 3113-3121.
-
(2008)
Discrete Applied Mathematics
, vol.156
, Issue.16
, pp. 3113-3121
-
-
Galbraith, S.1
Paterson, K.2
Smart, N.P.3
-
24
-
-
84937543435
-
REACT: Rapid enhanced-security asymmetric cryptosystem transform
-
T. Okamoto, D. Pointcheval. REACT: Rapid enhanced-security asymmetric cryptosystem transform. In: Proceedings ofCT-RSA'01, 2001, pp. 159-174.
-
(2001)
Proceedings OfCT-RSA'01
, pp. 159-174
-
-
Okamoto, T.1
Pointcheval, D.2
-
25
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare, P. Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of CCS'93, 1993, pp. 62-73.
-
(1993)
Proceedings of CCS'93
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
26
-
-
4243180376
-
The random oracle methodology, revisited
-
R. Canetti, O. Goldreich, S. Halevi. The random oracle methodology, revisited. Journal of ACM, 2004, Vol. 51, No. 4, pp. 557-594.
-
(2004)
Journal of ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
27
-
-
24144479376
-
Computing the Tate pairing
-
M. Scott. Computing the Tate pairing. In: Proceedings of CT-RSA'05, LNCS, 3376, 2005, pp. 293-304.
-
(2005)
Proceedings of CT-RSA'05, LNCS
, vol.3376
, pp. 293-304
-
-
Scott, M.1
-
28
-
-
69549116775
-
Identity-based anonymous remote authentication for value-added services in mobile networks
-
X. Cao, X. Zeng, W. Kou, L. Hu. Identity-based anonymous remote authentication for value-added services in mobile networks. In: IEEE Trans. Veh. TechnoL, 2009, Vol. 58, No. 7, pp. 3508-3517.
-
(2009)
IEEE Trans. Veh. TechnoL
, vol.58
, pp. 3508-3517
-
-
Cao, X.1
Zeng, X.2
Kou, W.3
Hu, L.4
-
29
-
-
77955659710
-
An efficient user authentication and key exchange protocol for mobile client-server environment
-
T. Y. Wu, Y. M. Tseng. An efficient user authentication and key exchange protocol for mobile client-server environment. Computer Networks, 2010, Vol. 54, No. 9, pp. 1520-1530.
-
(2010)
Computer Networks
, vol.54
, Issue.9
, pp. 1520-1530
-
-
Wu, T.Y.1
Tseng, Y.M.2
-
30
-
-
79955881087
-
Short-key certificateless encryption
-
G. Stephanides. Short-key certificateless encryption. In: Proceedings ofLightSec'11, 2011, pp. 69-75.
-
(2011)
Proceedings OfLightSec'11
, pp. 69-75
-
-
Stephanides, G.1
|