-
2
-
-
0345490607
-
Certificateless Public-Key Cryptography
-
LNCS 2894:, Springer-Verlag, 2003
-
S.S. Al-Riyami and K.G. Paterson. Certificateless Public-Key Cryptography. Advances in Cryptology - ASIACRYPT 2003, LNCS 2894:452–473. Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology - ASIACRYPT
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
3
-
-
85025662011
-
Secure Cryptographic Workflow in the Standard Model
-
Cryptology ePrint Archive, Report 2006/???
-
M. Barbosa and P. Farshim. Secure Cryptographic Workflow in the Standard Model. Full Version. Cryptology ePrint Archive, Report 2006/???. 2006.
-
(2006)
Full Version
-
-
Barbosa, M.1
Farshim, P.2
-
4
-
-
0842283854
-
Randomness Re-Use in Multi-Recipient Encryption Schemes
-
LNCS 2567, Springer-Verlag, 2003
-
M. Bellare, A. Boldyreva and J. Staddon. Randomness Re-Use in Multi-Recipient Encryption Schemes. Public Key Cryptography - PKC 2003, LNCS 2567:85–99. Springer-Verlag, 2003.
-
(2003)
Public Key Cryptography - PKC
, pp. 85-99
-
-
Bellare, M.1
Boldyreva, A.2
Staddon, J.3
-
5
-
-
85027202957
-
Generalized Secret Sharing and Monotone Functions
-
LNCS 403, Springer-Verlag
-
J. Benaloh and J. Leichter. Generalized Secret Sharing and Monotone Functions. Advances in Cryptology - CRYPTO ’88, LNCS 403:27–35. Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology - CRYPTO ’88
, pp. 27-35
-
-
Benaloh, J.1
Leichter, J.2
-
7
-
-
0037623983
-
Identity-Based Encryption from the Weil Pairing
-
D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. SIAM Journal on Computing, 32:586–615. 2003.
-
(2003)
SIAM Journal on Computing
, vol.32
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
24944502031
-
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption
-
Report 2004/261
-
D. Boneh and J. Katz. Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. Cryptology ePrint Archive, Report 2004/261, 2004.
-
(2004)
Cryptology Eprint Archive
-
-
Boneh, D.1
Katz, J.2
-
10
-
-
35048839958
-
Chosen-Ciphertext Security from Identity-Based Encryption
-
Report 2003/182
-
R. Canetti, S. Halevi and J. Katz. Chosen-Ciphertext Security from Identity-Based Encryption. Cryptology ePrint Archive, Report 2003/182, 2003.
-
(2003)
Cryptology Eprint Archive
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
11
-
-
33645751214
-
Security Proof of Sakai-Kasahara’s Identity-Based Encryption Scheme
-
LNCS 3796, Springer-Verlag
-
L. Chen and Z. Cheng. Security Proof of Sakai-Kasahara’s Identity-Based Encryption Scheme. Cryptography and Coding, LNCS 3796:442–459. Springer-Verlag, 2005.
-
(2005)
Cryptography and Coding
, pp. 442-459
-
-
Chen, L.1
Cheng, Z.2
-
12
-
-
33645583371
-
Multiple Trusted Authorities in Identifier Based Cryptography from Pairings on Elliptic Curves
-
HPL-2003-48, HP Laboratories
-
L. Chen and K. Harrison. Multiple Trusted Authorities in Identifier Based Cryptography from Pairings on Elliptic Curves. Technical Report, HPL-2003-48, HP Laboratories, 2003.
-
(2003)
Technical Report
-
-
Chen, L.1
Harrison, K.2
-
13
-
-
84944050090
-
Applications of Multiple Trusted Authorities in Pairing Based Cryptosystems
-
LNCS 2437, Springer-Verlag
-
L. Chen, K. Harrison, D. Soldera and N.P. Smart. Applications of Multiple Trusted Authorities in Pairing Based Cryptosystems. Proceedings InfraSec 2002, LNCS 2437:260–275. Springer-Verlag, 2002.
-
(2002)
Proceedings Infrasec 2002
, pp. 260-275
-
-
Chen, L.1
Harrison, K.2
Soldera, D.3
Smart, N.P.4
-
14
-
-
84870707379
-
A Practical Public-Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
-
LNCS 1462, Springer-Verlag
-
R. Cramer and V. Shoup,. A Practical Public-Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. Advances in Cryptology - CRYPTO ’98, LNCS 1462:13–25. Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology - CRYPTO ’98
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
15
-
-
33646842805
-
A Designer’s Guide to KEMs
-
LNCS 2898,. Springer-Verlag
-
A.W. Dent. A Designer’s Guide to KEMs. Coding and Cryptography, LNCS 2898:133–151. Springer-Verlag, 2003.
-
(2003)
Coding and Cryptography
, pp. 133-151
-
-
Dent, A.W.1
-
16
-
-
24144468589
-
Chosen-Ciphertext Security of Multiple Encryption
-
LNCS 3378, Springer-Verlag, 2005
-
Y. Dodis and J. Katz. Chosen-Ciphertext Security of Multiple Encryption. TCC 2005, LNCS 3378:188–209. Springer-Verlag, 2005.
-
(2005)
TCC
, pp. 188-209
-
-
Dodis, Y.1
Katz, J.2
-
17
-
-
33746062799
-
Practical identity-based encryption without random oracles
-
LNCS 4004, Springer-Verlag
-
C. Gentry. Practical identity-based encryption without random oracles. Advances in Cryptology - EUROCRYPT 2006, LNCS 4004:445–464. Springer-Verlag, 2006.
-
(2006)
Advances in Cryptology - EUROCRYPT 2006
, pp. 445-464
-
-
Gentry, C.1
-
18
-
-
78650256253
-
KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption
-
Report 2006/265
-
J. Herranz and D. Hofheinz and E. Kiltz. KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption. Cryptology ePrint Archive, Report 2006/265. 2006.
-
(2006)
Cryptology Eprint Archive
-
-
Herranz, J.1
Hofheinz, D.2
Kiltz, E.3
-
20
-
-
38049004199
-
Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts
-
Report 2006/1221s
-
E. Kiltz. Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts. Cryptology ePrint Archive, Report 2006/1221s, 2006.
-
(2006)
Cryptology Eprint Archive
-
-
Kiltz, E.1
-
22
-
-
77951259506
-
On the Equivalence of Several Security Notions of Key Encapsulation Mechanism
-
Report 2006/268
-
W. Nagao, Y. Manabe and T. Okamoto. On the Equivalence of Several Security Notions of Key Encapsulation Mechanism. Cryptology ePrint Archive, Report 2006/268. 2006.
-
(2006)
Cryptology Eprint Archive
-
-
Nagao, W.1
Manabe, Y.2
Okamoto, T.3
-
23
-
-
1642414982
-
Cryptography from Pairings: A Snapshot of Current Research
-
K.G. Paterson. Cryptography from Pairings: A Snapshot of Current Research. Information Security Technical Report, 7:41–54, 2002.
-
(2002)
Information Security Technical Report
, vol.7
, pp. 41-54
-
-
Paterson, K.G.1
-
24
-
-
33645585449
-
ID-Based Cryptosystems with Pairing on Elliptic Curve
-
Report 2003/054
-
R. Sakai and M. Kasahara. ID-Based Cryptosystems with Pairing on Elliptic Curve. Cryptology ePrint Archive, Report 2003/054, 2003.
-
(2003)
Cryptology Eprint Archive
-
-
Sakai, R.1
Kasahara, M.2
-
26
-
-
85020598353
-
Identity-Based Cryptosystems and Signature Schemes
-
LNCS 196, Springer-Verlag
-
A. Shamir. Identity-Based Cryptosystems and Signature Schemes. Proceedings of CRYPTO ’84 on Advances in Cryptology, LNCS 196:47–53. Springer-Verlag, 1985.
-
(1985)
Proceedings of CRYPTO ’84 on Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
27
-
-
35248891001
-
Access Control Using Pairing Based Cryptography
-
LNCS 2612, Springer-Verlag
-
N.P. Smart. Access Control Using Pairing Based Cryptography. Topics in Cryptology - CT-RSA 2003, LNCS 2612:111–121. Springer-Verlag, 2003.
-
(2003)
Topics in Cryptology - CT-RSA 2003
, pp. 111-121
-
-
Smart, N.P.1
-
28
-
-
33750058631
-
Efficient Identity-Based Encryption Without Random Oracles
-
Report 2004/180
-
B.R. Waters. Efficient Identity-Based Encryption Without Random Oracles. Cryptology ePrint Archive, Report 2004/180, 2004.
-
(2004)
Cryptology Eprint Archive
-
-
Waters, B.R.1
|