-
1
-
-
35048841300
-
Efficient selective-ID secure identity-based encryption without random oracles
-
Cachin, Ch., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, Ch., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
2
-
-
35048848152
-
Short signatures without random oracles
-
Cachin, Ch., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, Ch., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
3
-
-
38149009170
-
Short signatures without random oracles and the SDH assumption in bilinear groups
-
Boneh, D., Boyen, X.: Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptol. 21(2), 149-177 (2008)
-
(2008)
J. Cryptol.
, vol.21
, Issue.2
, pp. 149-177
-
-
Boneh, D.1
Boyen, X.2
-
4
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005) (Pubitemid 41313968)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
5
-
-
35048887476
-
Short group signatures
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
6
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258-275. Springer, Heidelberg (2005) (Pubitemid 43902118)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621 LNCS
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
8
-
-
23044435711
-
Short signatures from the Weil pairing
-
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. J. Cryptol. 17(4), 297-319 (2004)
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
10
-
-
33746042561
-
Security analysis of the strong Diffie-Hellman problem
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Cheon, J.H.: Security analysis of the strong Diffie-Hellman problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 1-11. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 1-11
-
-
Cheon, J.H.1
-
11
-
-
77954763128
-
Discrete logarithm problems with auxiliary inputs
-
Cheon, J.H.: Discrete logarithm problems with auxiliary inputs. J. Cryptol. 23(3), 457-476 (2010)
-
(2010)
J. Cryptol.
, vol.23
, Issue.3
, pp. 457-476
-
-
Cheon, J.H.1
-
13
-
-
77649118700
-
Diffie-Hellman is as strong as discrete log for certain primes
-
Goldwasser, S. (ed.) CRYPTO 1988. Springer, Heidelberg
-
den Boer, B.: Diffie-Hellman is as strong as discrete log for certain primes. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 530-539. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.403
, pp. 530-539
-
-
Den Boer, B.1
-
14
-
-
69949153112
-
Boneh-Boyen signatures and the strong Diffie-Hellman problem
-
Shacham, H., Waters, B. (eds.) Pairing 2009. Springer, Heidelberg
-
Jao, D., Yoshida, K.: Boneh-Boyen signatures and the strong Diffie-Hellman problem. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 1-16. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5671
, pp. 1-16
-
-
Jao, D.1
Yoshida, K.2
-
16
-
-
84902596352
-
A new approach to discrete logarithm problem with auxiliary inputs
-
Kim, T., Cheon, J.H.: A new approach to discrete logarithm problem with auxiliary inputs. IACR Cryptology ePrint Archive. http://eprint.iacr.org/2012/ 609 (2012)
-
(2012)
IACR Cryptology EPrint Archive
-
-
Kim, T.1
Cheon, J.H.2
-
18
-
-
84947597805
-
Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
-
Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
-
Maurer, U.M.: Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 271-281. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 271-281
-
-
Maurer, U.M.1
-
19
-
-
0032621240
-
The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms
-
Maurer, U.M., Wolf, S.: The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms. SIAM J. Comput. 28(5), 1689-1721 (1999)
-
(1999)
SIAM J. Comput.
, vol.28
, Issue.5
, pp. 1689-1721
-
-
Maurer, U.M.1
Wolf, S.2
-
20
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
21
-
-
84902596353
-
On generalization of Cheon's algorithm
-
Satoh, T.: On generalization of Cheon's algorithm. IACR Cryptology ePrint Archive. http://eprint.iacr.org/2009/058 (2009)
-
(2009)
IACR Cryptology EPrint Archive
-
-
Satoh, T.1
|