ID-based cryptography

Results: 183



#Item
91ElGamal encryption / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / ID-based encryption / Key / Random oracle / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem

Secure Public-Key Encryption from Factorisation-Related Problems by Jaimee Brown Bachelor of Information Technology/ Bachelor of Applied Science

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:12:09
92Digital signature / Public key certificate / Certificate authority / Non-repudiation / Public key infrastructure / Revocation list / S/MIME / ID-based encryption / Cryptography / Public-key cryptography / Key management

Information Security Animations - Public Key Infrastructure (Script) Public Key Infrastructure Public Key Infrastructure (PKI) provides a safe and reliable environment for electronic transactions on

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-08-31 06:18:36
93Digital signature / Public key certificate / Certificate authority / Non-repudiation / Public key infrastructure / Revocation list / S/MIME / ID-based encryption / Cryptography / Public-key cryptography / Key management

Information Security Animations - Public Key Infrastructure (Script) Public Key Infrastructure Public Key Infrastructure (PKI) provides a safe and reliable environment for electronic transactions on

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-08-31 06:18:10
94Cryptographic protocols / ID-based encryption / Public key infrastructure / Digital signature / ElGamal encryption / Diffie–Hellman key exchange / Semantic security / Cryptography / Public-key cryptography / Key management

Secret Handshakes from CA-Oblivious Encryption Claude Castelluccia2,1 , Stanislaw Jarecki1, and Gene Tsudik1 1 2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
95ID-based encryption / Advantage / Paillier cryptosystem / Boneh/Franklin scheme / Random oracle / Cryptography / Public-key cryptography / Ciphertext indistinguishability

An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

Add to Reading List

Source URL: www.ippari.unict.it

Language: English - Date: 2009-01-08 04:52:18
96Computing / Computer-mediated communication / Internet privacy / Milter / Sendmail / S/MIME / Encryption / ID-based encryption / Internet messaging platform / Cryptography / Email / Email authentication

Data Sheet SeNDMAIL ENCRYPTION Policy-Based Encryption with Voltage IBE OVERVIEW

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2007-09-14 14:24:07
97Deniable encryption / Deniable authentication / ID-based encryption / Digital signature / Commitment scheme / Zero-knowledge proof / RSA / Integrated Encryption Scheme / Index of cryptography articles / Cryptography / Public-key cryptography / Cryptographic protocols

Deniable Ring Authentication∗ Moni Naor Weizmann Institute of Science Rehovot 76100, Israel [removed]

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2002-06-03 03:07:12
98Cryptographic protocols / Electronic commerce / ID-based encryption / Transport Layer Security / Certificate authority / Cipher / Key / Public key certificate / Certificate server / Cryptography / Public-key cryptography / Key management

Using Identity-Based Encryption to Eliminate Certificates in SSL Transactions

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-07-18 00:26:34
99ID-based encryption / ID-based cryptography / Key distribution / Public key infrastructure / Digital signature / Man-in-the-middle attack / Key / Cryptography / Key management / Public-key cryptography

An Identity-Based Key Infrastructure Suitable for Messaging and Its Application to E-mail ∗ Ay¸se Gül Karatop

Add to Reading List

Source URL: research.sabanciuniv.edu

Language: English - Date: 2008-11-07 06:20:13
100Email / Internet / Public-key cryptography / Electronic documents / S/MIME / Email client / ID-based encryption / Cryptography / Computing / Email authentication

User-Level_S:MIME Encryption

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2011-05-24 15:35:31
UPDATE