-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Boneh, D., Franklin,M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
0345490607
-
Certificateless public key cryptography
-
Laih, C.-S. (ed.) ASIACRYPT 2003. Springer, Heidelberg
-
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452-473. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
4
-
-
84865492443
-
Certificateless Encryption
-
IOS Press
-
Chow, S.S.M.: Certificateless Encryption. In: Identity-Based Cryptography, pp. 135-155. IOS Press (2008)
-
(2008)
Identity-Based Cryptography
, pp. 135-155
-
-
Chow, S.S.M.1
-
5
-
-
53449097686
-
A Survey of Certificateless Encryption Schemes and Security Models
-
Dent, A.W.: A Survey of Certificateless Encryption Schemes and Security Models. Int. J. Inf. Sec. 7(5), 349-377 (2008)
-
(2008)
Int. J. Inf. Sec.
, vol.7
, Issue.5
, pp. 349-377
-
-
Dent, A.W.1
-
6
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272-293. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 272-293
-
-
Gentry, C.1
-
7
-
-
84937570422
-
Self-certified public keys
-
Davies, D.W. (ed.) EUROCRYPT 1991. Springer, Heidelberg
-
Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490-497. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 490-497
-
-
Girault, M.1
-
8
-
-
67049154036
-
Removing escrow from identity-based encryption
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
-
Chow, S.S.M.: Removing escrow from identity-based encryption. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 256-276. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 256-276
-
-
Chow, S.S.M.1
-
9
-
-
38049125096
-
Reducing trust in the PKG in identity based cryptosystems
-
Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
-
Goyal, V.: Reducing trust in the PKG in identity based cryptosystems. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 430-447. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 430-447
-
-
Goyal, V.1
-
10
-
-
45749146255
-
Traceable and retrievable identity-based encryption
-
Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. Springer, Heidelberg
-
Au, M.H., Huang, Q., Liu, J.K., Susilo, W., Wong, D.S., Yang, G.: Traceable and retrievable identity-based encryption. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 94-110. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5037
, pp. 94-110
-
-
Au, M.H.1
Huang, Q.2
Liu, J.K.3
Susilo, W.4
Wong, D.S.5
Yang, G.6
-
11
-
-
70349289356
-
Black-box accountable authority identity-based encryption
-
ACM
-
Goyal, V., Lu, S., Sahai, A., Waters, B.: Black-box accountable authority identity-based encryption. In: CCS 2008, pp. 427-436. ACM (2008)
-
(2008)
CCS 2008
, pp. 427-436
-
-
Goyal, V.1
Lu, S.2
Sahai, A.3
Waters, B.4
-
12
-
-
77955090387
-
How to construct identity-based signatures without the key escrow problem
-
Yuen, T.H., Susilo, W., Mu, Y.: How to construct identity-based signatures without the key escrow problem. Int. J. Inf. Sec. 9(4), 297-311 (2010)
-
(2010)
Int. J. Inf. Sec.
, vol.9
, Issue.4
, pp. 297-311
-
-
Yuen, T.H.1
Susilo, W.2
Mu, Y.3
-
13
-
-
33745818483
-
Security-Mediated Certificateless Cryptography
-
Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. Springer, Heidelberg
-
Chow, S.S.M., Boyd, C., González Nieto, J.M.: Security-Mediated Certificateless Cryptography. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 508-524. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3958
, pp. 508-524
-
-
Chow, S.S.M.1
Boyd, C.2
González Nieto, J.M.3
-
14
-
-
79953164949
-
Achieving leakage resilience through dual system encryption
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
-
Lewko, A., Rouselakis, Y., Waters, B.: Achieving leakage resilience through dual system encryption. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 70-88. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6597
, pp. 70-88
-
-
Lewko, A.1
Rouselakis, Y.2
Waters, B.3
-
15
-
-
84859970436
-
Identity-based encryption resilient to continual auxiliary leakage
-
Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg
-
Yuen, T.H., Chow, S.S.M., Zhang, Y., Yiu, S.M.: Identity-based encryption resilient to continual auxiliary leakage. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 117-134. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7237
, pp. 117-134
-
-
Yuen, T.H.1
Chow, S.S.M.2
Zhang, Y.3
Yiu, S.M.4
-
16
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
(extended abstract). Fumy, W. (ed.) EUROCRYPT 1997. Springer, Heidelberg
-
Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults (extended abstract). In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37-51. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
17
-
-
84958641478
-
Differential fault analysis of secret key cryptosystems
-
Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513-525. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
18
-
-
84871593637
-
RKA security beyond the linear barrier: IBE, encryption and signatures
-
Wang, X., Sako, K. (eds.) ASIACRYPT 2012. Springer, Heidelberg
-
Bellare, M., Paterson, K.G., Thomson, S.: RKA security beyond the linear barrier: IBE, encryption and signatures. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 331-348. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7658
, pp. 331-348
-
-
Bellare, M.1
Paterson, K.G.2
Thomson, S.3
-
20
-
-
84863311631
-
Storing Secrets on Continually Leaky Devices
-
Ostrovsky, R. (ed.) IEEE
-
Dodis, Y., Lewko, A.B., Waters, B., Wichs, D.: Storing Secrets on Continually Leaky Devices. In: Ostrovsky, R. (ed.) FOCS 2011, pp. 688-697. IEEE (2011)
-
(2011)
FOCS 2011
, pp. 688-697
-
-
Dodis, Y.1
Lewko, A.B.2
Waters, B.3
Wichs, D.4
|