Certificateless cryptography

Results: 10



#Item
1Public-key cryptography / Key encapsulation / Ciphertext indistinguishability / Cipher / Cryptographic protocol / Semantic security / Key / Standard model / Transport Layer Security / Cryptography / ID-based encryption / Advantage

Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement Dario Fiore1? , Rosario Gennaro2 , and Nigel P. Smart3 ´ Ecole Normale Sup´erieure,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-30 11:15:58
2Digital signature / RSA / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / ID-based encryption

Key Replacement Attack on a Certificateless Signature Scheme Zhenfeng Zhang, Dengguo Feng, State Key Laboratory of Information Security Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhan

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-30 05:02:16
3Public-key cryptography / Key-agreement protocol / Information / Cyberwarfare / Computing / Cryptographic protocols / Certificateless cryptography / Diffie–Hellman key exchange

Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol Qingfeng Cheng Luoyang University of Foreign Languages, Luoyang, PR China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-28 03:05:00
4Onion routing / Network architecture / Tor / Routing / Mix network / Certificateless cryptography / Internet privacy / Internet / Computing

Using Sphinx to Improve Onion Routing Circuit Construction∗ Aniket Kate and Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo, ON, Canada {akate,iang}@cs.uwaterloo.ca Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-19 14:07:01
5Key / Public-key cryptography / Ciphertext / Adaptive chosen-ciphertext attack / Diffie–Hellman key exchange / Certificateless cryptography / Cramer–Shoup cryptosystem / Cryptography / ID-based encryption / Chosen-ciphertext attack

On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhang@

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-23 04:27:14
6Certificateless cryptography / Applied mathematics / Security / Digital signature / BLS / Key signature / RSA / Public-key cryptography / Cryptography / Cyberwarfare

Efficient Certificateless Signatures Suitable for Aggregation Rafael Castro∗ Ricardo Dahab

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-06 13:51:07
7Mathematics / Cryptography / Advantage / Elliptic curve cryptography

Microsoft Word - Efficient and provably-secure certificateless signature scheme without bilinear pairings.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-02-27 09:37:29
8Electronic commerce / Ciphertext indistinguishability / RSA / Semantic security / Cipher / ID-based cryptography / Key / Public key infrastructure / Symmetric-key algorithm / Cryptography / Public-key cryptography / Key management

Certificateless Public Key Cryptography Sattam S. Al-Riyami and Kenneth G. Paterson∗ Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
9ID-based encryption / ID-based cryptography / Certificate-based encryption / Digital signature / Key / Diffie–Hellman key exchange / Public key infrastructure / Certificateless cryptography / Cryptography / Key management / Public-key cryptography

PDF Document

Add to Reading List

Source URL: crpit.com

Language: English - Date: 2012-01-19 01:27:31
10Cyberwarfare / Security / Applied mathematics / RSA / Cipher / Public key infrastructure / Digital signature / Key / Certificateless cryptography / Cryptography / Public-key cryptography / Key management

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-10-21 08:21:48
UPDATE