-
1
-
-
35048835319
-
Secure identity based encryption without random oracles
-
CRYPTO 2004 Lecture Notes in Computer Science Springer-Verlag Berlin
-
D. Boneh, and X. Boyen Secure identity based encryption without random oracles Advances in Cryptology CRYPTO 2004 Lecture Notes in Computer Science vol. 3152 2004 Springer-Verlag Berlin 443 459
-
(2004)
Advances in Cryptology
, vol.3152
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
2
-
-
35048841300
-
Efficient selective-id secure identity based encryption without random oracles
-
EUROCRYPT 2004 Lecture Notes in Computer Science Springer-Verlag Berlin
-
D. Boneh, and X. Boyen Efficient selective-id secure identity based encryption without random oracles Advances in Cryptology EUROCRYPT 2004 Lecture Notes in Computer Science vol. 3027 2004 Springer-Verlag Berlin 223 238
-
(2004)
Advances in Cryptology
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
3
-
-
0012970453
-
Identity-based encryption from the Weil pairing
-
CRYPTO 2001 Lecture Notes in Computer Science Springer-Verlag Berlin
-
D. Boneh, and M.K. Franklin Identity-based encryption from the Weil pairing Advances in Cryptology CRYPTO 2001 Lecture Notes in Computer Science vol. 2193 2001 Springer-Verlag Berlin 213 229
-
(2001)
Advances in Cryptology
, vol.2193
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
4
-
-
0037623983
-
Identity based encryption from the Weil pairing
-
D. Boneh, and M.K. Franklin Identity based encryption from the Weil pairing SIAM J. Comput. 32 3 2003 586 615
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
5
-
-
33745854208
-
Chosen-ciphertext security from identity-based encryption
-
D. Boneh, R. Canetti, S. Halevi, and J. Katz Chosen-ciphertext security from identity-based encryption SIAM J. Comput. 36 5 2003 1301 1328
-
(2003)
SIAM J. Comput.
, vol.36
, Issue.5
, pp. 1301-1328
-
-
Boneh, D.1
Canetti, R.2
Halevi, S.3
Katz, J.4
-
6
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Lecture Notes in Computer Science Springer-Verlag
-
C. Cocks An identity based encryption scheme based on quadratic residues International Conference on Cryptography and Coding (Proceedings of IMA) Lecture Notes in Computer Science vol. 2260 2001 Springer-Verlag 360 363
-
(2001)
International Conference on Cryptography and Coding (Proceedings of IMA)
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
7
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGmal A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Trans. Inf. Theory 31 1995 469 472
-
(1995)
IEEE Trans. Inf. Theory
, vol.31
, pp. 469-472
-
-
Elgmal, T.1
-
8
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Crypto'99 Lecture Notes in Computer Science Springer-Verlag Berlin
-
E. Fujisaki, and T. Okamoto Secure integration of asymmetric and symmetric encryption schemes Advances in Cryptology Crypto'99 Lecture Notes in Computer Science vol. 1666 1999 Springer-Verlag Berlin 537 554
-
(1999)
Advances in Cryptology
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
11
-
-
32244433334
-
K-Resilient identity-based encryption in the standard model
-
CT-RSA 2004 Lecture Notes in Computer Science Springer-Verlag Berlin
-
S. Heng, and K. Kurosawa k-Resilient identity-based encryption in the standard model Topics in Cryptology CT-RSA 2004 Lecture Notes in Computer Science vol. 2964 2004 Springer-Verlag Berlin 67 80
-
(2004)
Topics in Cryptology
, vol.2964
, pp. 67-80
-
-
Heng, S.1
Kurosawa, K.2
-
12
-
-
32244433690
-
K-Resilient identity-based encryption in the standard model
-
S. Heng, and K. Kurosawa k-Resilient identity-based encryption in the standard model IEICE Trans. Fundam. E89CA 1 2006 39 46
-
(2006)
IEICE Trans. Fundam.
, vol.89 E CA
, Issue.1
, pp. 39-46
-
-
Heng, S.1
Kurosawa, K.2
-
13
-
-
43149089620
-
CCA2 secure IBE: Standard model efficiency through authenticated symmetric encryption
-
Lecture Notes in Computer Science Springer-Verlag
-
E. Kiltz, and Y. Vahlis CCA2 secure IBE: standard model efficiency through authenticated symmetric encryption CT-RSA Lecture Notes in Computer Science vol. 4964 2008 Springer-Verlag 221 239
-
(2008)
CT-RSA
, vol.4964
, pp. 221-239
-
-
Kiltz, E.1
Vahlis, Y.2
-
14
-
-
3042658813
-
Constructing identity-based cryptosystems for discrete logarithm based cryptosystems
-
W.C. Lee, and K.C. Liao Constructing identity-based cryptosystems for discrete logarithm based cryptosystems J. Netw. Comput. Appl. 22 2004 191 199
-
(2004)
J. Netw. Comput. Appl.
, vol.22
, pp. 191-199
-
-
Lee, W.C.1
Liao, K.C.2
-
15
-
-
84911480739
-
-
ePrint Archive, Report 2002/072
-
B. Lynn Authenticated ID-based encryption, cryptology ePrint Archive, Report 2002/072 2002 http://eprint.iacr.org/2002/072
-
(2002)
J. Netw. Comput. Appl.
-
-
Lynn, B.1
-
16
-
-
84863524235
-
An ID-based cryptographic mechanisms based on GDLP and IFP
-
C. Meshram, S. Meshram, and M. Zhang An ID-based cryptographic mechanisms based on GDLP and IFP Inf. Process. Lett. 112 19 2012 753 758
-
(2012)
Inf. Process. Lett.
, vol.112
, Issue.19
, pp. 753-758
-
-
Meshram, C.1
Meshram, S.2
Zhang, M.3
-
17
-
-
84875709980
-
An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
-
C. Meshram, and S. Meshram An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem Inf. Process. Lett. 113 10-11 2013 375 380
-
(2013)
Inf. Process. Lett.
, vol.113
, Issue.1011
, pp. 375-380
-
-
Meshram, C.1
Meshram, S.2
-
18
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Lecture Notes in Computer Science Springer-Verlag
-
A. Shamir Identity-based cryptosystems and signature schemes Proceedings of CRYPTO'84 Lecture Notes in Computer Science vol. 196 1984 Springer-Verlag 47 53
-
(1984)
Proceedings of CRYPTO'84
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
19
-
-
77955229114
-
An identity-based security system for user privacy in vehicular ad hoc networks
-
J. Sun, C. Zhang, Y. Zhang, and Y. Fang An identity-based security system for user privacy in vehicular ad hoc networks IEEE Trans. Parallel Distrib. Syst. 27 9 2010 1227 1239
-
(2010)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.9
, pp. 1227-1239
-
-
Sun, J.1
Zhang, C.2
Zhang, Y.3
Fang, Y.4
-
20
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
CRYPTO 2005 Lecture Notes in Computer Science Springer-Verlag Berlin
-
B. Waters Efficient identity-based encryption without random oracles Advances in Cryptology CRYPTO 2005 Lecture Notes in Computer Science vol. 3494 2005 Springer-Verlag Berlin 114 127
-
(2005)
Advances in Cryptology
, vol.3494
, pp. 114-127
-
-
Waters, B.1
|