-
1
-
-
84937427768
-
A New Forward-Secure Digital Signature Scheme
-
Springer-Verlag
-
M. Abdalla and L. Reyzin, “A New Forward-Secure Digital Signature Scheme,” Proc. of Asiacrypt 2000, LNCS 1976, Springer-Verlag, pp. 116-129,2000.
-
(2000)
Proc. Of Asiacrypt 2000, LNCS
, vol.1976
, pp. 116-129
-
-
Abdalla, M.1
Reyzin, L.2
-
3
-
-
79958074367
-
A Forward-Secure Digital Signature Scheme
-
Springer-Verlag
-
M. Bellare and S.K. Miner, “A Forward-Secure Digital Signature Scheme,” Proc. of CRYPTO’99, LNCS 1666, Springer-Verlag, pp. 431-448, 1999.
-
(1999)
Proc. Of CRYPTO’99, LNCS
, vol.1666
, pp. 431-448
-
-
Bellare, M.1
Miner, S.K.2
-
4
-
-
0020890723
-
Non-public Key Distribution
-
Plenum Press
-
R. Blom, “Non-public Key Distribution,” Proc. of CRYPTO’82, Plenum Press, pp.231-236, 1983.
-
(1983)
Proc. Of CRYPTO’82
, pp. 231-236
-
-
Blom, R.1
-
5
-
-
85028765277
-
Perfectly Secure Key Distribution for Dynamic Conferences
-
Springer-Verlag
-
C. Blundo, A. DeSantis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, “Perfectly Secure Key Distribution for Dynamic Conferences,” Proc. of CRYPTO’92, LNCS 740, Springer-Verlag, pp.471-486, 1993.
-
(1993)
Proc. Of CRYPTO’92, LNCS
, vol.740
, pp. 471-486
-
-
Blundo, C.1
Desantis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
6
-
-
84955614214
-
Trade-offs between Communication and Strage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution
-
LNCS, Springer- Verlag
-
C. Blundo, L.A. Frota Mattos and D.R. Stinson, “Trade-offs between Communication and Strage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution,” Proc. of CRYPTO’96, LNCS 1109, Springer- Verlag, pp.387-400, 1996.
-
(1996)
Proc. Of CRYPTO’96
, vol.1109
, pp. 387-400
-
-
Blundo, C.1
Frota Mattos, L.A.2
Stinson, D.R.3
-
7
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Springer-Verlag
-
D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. of CRYPTO 2001, LNCS 2139, Springer-Verlag, pp.213-229, 2001.
-
(2001)
Proc. Of CRYPTO 2001, LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
84957712291
-
An Efficient Threshold Public-Key Cryptosystem secure against adaptive chosen-ciphertext attack
-
Springer-Verlag
-
R. Canetti and S. Goldwasser, “An Efficient Threshold Public-Key Cryptosystem secure against adaptive chosen-ciphertext attack,” Proc. of Eurocrypt’99, LNCS 1592, Springer-Verlag, pp.90-106, 1999.
-
(1999)
Proc. Of Eurocrypt’99, LNCS
, vol.1592
, pp. 90-106
-
-
Canetti, R.1
Goldwasser, S.2
-
9
-
-
77950151506
-
An Identity Based Encryption Scheme Based on Quadratic Residues
-
Springer- Verlag
-
C. Cocks, “An Identity Based Encryption Scheme Based on Quadratic Residues,” Proc. of IMA Int. Conf. 2001, Coding and Cryptography, LNCS 2260, Springer- Verlag, pp. 360-363, 2001.
-
(2001)
Proc. Of IMA Int. Conf. 2001, Coding and Cryptography, LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
10
-
-
84947254092
-
Key-Insulated Public Key Cryptosystems
-
LNCS, Springer-Verlag
-
Y. Dodis, J. Katz, S. Xu and M. Yung, “Key-Insulated Public Key Cryptosystems,” Proc. of Eurocrypt 2002, LNCS 2332, Springer-Verlag, pp.65-82, 2002.
-
(2002)
Proc. Of Eurocrypt 2002
, vol.2332
, pp. 65-82
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
11
-
-
84979291225
-
Broadcast Encryption
-
Springer-Verlag
-
A. Fiat and M. Naor, “Broadcast Encryption,” Proc. of CRYPTO’93, LNCS 773, Springer-Verlag, pp.480-491, 1994.
-
(1994)
Proc. Of CRYPTO’93, LNCS
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
12
-
-
84956861571
-
An Efficient Hierarchical Identity-based Key-Sharing Method Resistant against Collusion-Attacks
-
Springer-Verlag
-
G. Hanaoka, T. Nishioka, Y. Zheng and H. Imai, “An Efficient Hierarchical Identity-based Key-Sharing Method Resistant against Collusion-Attacks,” Proc. of Asiacrypt’99, LNCS 1716, Springer-Verlag, pp.348-362, 1999.
-
(1999)
Proc. Of Asiacrypt’99, LNCS
, vol.1716
, pp. 348-362
-
-
Hanaoka, G.1
Nishioka, T.2
Zheng, Y.3
Imai, H.4
-
13
-
-
84947803330
-
Some Bounds and a Construction for Secure Broadcast Encryption
-
Springer-Verlag
-
K. Kurosawa, T. Yoshida, Y. Desmedt and M. Burmester, “Some Bounds and a Construction for Secure Broadcast Encryption,” Proc. of Asiacrypt’98, LNCS 1514, Springer-Verlag, pp.420-433, 1998.
-
(1998)
Proc. Of Asiacrypt’98, LNCS
, vol.1514
, pp. 420-433
-
-
Kurosawa, K.1
Yoshida, T.2
Desmedt, Y.3
Burmester, M.4
-
14
-
-
84989455644
-
On the KEY PREDISTRIBUTION SYSTEM: A Practical Solution to the Key Distribution Problem
-
Springer-Verlag
-
T. Matsumoto and H. Imai, “On the KEY PREDISTRIBUTION SYSTEM: A Practical Solution to the Key Distribution Problem,” Proc. of CRYPTO’87, LNCS 293, Springer-Verlag, pp.185-193, 1987.
-
(1987)
Proc. Of CRYPTO’87, LNCS
, vol.293
, pp. 185-193
-
-
Matsumoto, T.1
Imai, H.2
-
15
-
-
85020598353
-
Identity-Based Cryptosystems and Signature Schemes
-
Springer-Verlag
-
A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Proc. of CRYPTO’84, LNCS 196, Springer-Verlag, pp.47-53, 1985.
-
(1985)
Proc. Of CRYPTO’84, LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
16
-
-
84888872516
-
Securing Threshold Cryptosystems Against Chosen- Ciphertext Attack
-
Springer-Verlag
-
V. Shoup and R. Gennaro, “Securing Threshold Cryptosystems Against Chosen- Ciphertext Attack,” Proc. of Eurocrypt’99, LNCS 1403, Springer-Verlag, pp.1-16, 1998.
-
(1998)
Proc. Of Eurocrypt’99, LNCS
, vol.1403
, pp. 1-16
-
-
Shoup, V.1
Gennaro, R.2
-
17
-
-
0000028420
-
On Some Methods for Unconditionally Secure Key distribution and broadcast encryption
-
D.R. Stinson, “On Some Methods for Unconditionally Secure Key distribution and broadcast encryption,” Designs, Codes and Cryptography, 12, pp.215-243, 1997.
-
(1997)
Designs, Codes and Cryptography
, vol.12
, pp. 215-243
-
-
Stinson, D.R.1
-
18
-
-
84944048103
-
Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures
-
Springer- Verlag
-
D.R. Stinson and R. Wei, “Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures,” Proc. SAC’99, LNCS 1758, Springer- Verlag, pp.200-214, 1999.
-
(1999)
Proc. SAC’99, LNCS
, vol.1758
, pp. 200-214
-
-
Stinson, D.R.1
Wei, R.2
|