<--- Back to Details
First PageDocument Content
Public-key cryptography / Signcryption / Digital signature / Cipher / Pairing-based cryptography / Key / Proxy re-encryption / Boneh/Franklin scheme / Cryptography / ID-based encryption / ID-based cryptography
Date: 2012-05-09 09:22:20
Public-key cryptography
Signcryption
Digital signature
Cipher
Pairing-based cryptography
Key
Proxy re-encryption
Boneh/Franklin scheme
Cryptography
ID-based encryption
ID-based cryptography

Pairing-based Cryptography: Identity Based Encryption and Beyond

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 33,80 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Signcryption / Cryptographic primitive / Ciphertext indistinguishability / Key

Functional Signcryption: Notion, Construction, and Applications by Pratish Datta joint work with

DocID: 1qeWc - View Document

Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps Paulo S. L. M. Barreto2 , Benoˆıt Libert3⋆ , Noel McCullagh1⋆⋆ , and Jean-Jacques Quisquater3 1

DocID: 1nDj4 - View Document

Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Yang Wang1 , Mark Manulis2 , Man Ho Au1 , and Willy Susilo1, 1

DocID: 1m4eG - View Document

Cryptography / Public-key cryptography / Signcryption / Authenticated encryption / Cryptographic protocol / Secure channel / Key authentication / Serge Vaudenay / Encryption / Block cipher / Draft:C. Pandu Rangan / Index of cryptography articles

- Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

DocID: 1lBQV - View Document

Building Better Signcryption Schemes with Tag-KEMs Tor E. Bjørstad1 and Alexander W. Dent2 1 The Selmer Center, Department of Informatics,

DocID: 1enj2 - View Document