ID-based cryptography

Results: 183



#Item
101Digital signature / Diffie–Hellman problem / Signcryption / Group signature / Blind signature / ID-based encryption / RSA / Pairing / Diffie–Hellman key exchange / Cryptography / BLS / Decisional Diffie–Hellman assumption

Pairing-Based Cryptographic Protocols : A Survey Ratna Dutta, Rana Barua and Palash Sarkar Cryptology Research Group Stat-Math and Applied Statistics Unit 203, B. T. Road, Kolkata India[removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-06-24 08:19:14
102Pairing / Boneh/Franklin scheme / Elliptic curve cryptography / Diffie–Hellman problem / Elliptic curve / ID-based encryption / Tate pairing / BLS / Supersingular elliptic curve / Cryptography / Abstract algebra / Algebra

An Introduction to Pairing-Based Cryptography Alfred Menezes Abstract. Bilinear pairings have been used to design ingenious protocols for such tasks as one-round three-party key agreement, identity-based encryption, and

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-10-27 06:53:30
103ID-based encryption / Semantic security / Chosen-plaintext attack / RSA / Advantage / Boneh/Franklin scheme / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / GMR / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions∗ Yang Cui1 , Eiichiro Fujisaki2 , Goichiro Hanaoka1 , Hideki Imai1,3 and Rui Zhang1 1 National Institute of Advanced Ind

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-10 22:37:01
104Electronic commerce / Ciphertext indistinguishability / RSA / Semantic security / Cipher / ID-based cryptography / Key / Public key infrastructure / Symmetric-key algorithm / Cryptography / Public-key cryptography / Key management

Certificateless Public Key Cryptography Sattam S. Al-Riyami and Kenneth G. Paterson∗ Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
105Broadcast encryption / Copy protection / Digital rights management / ID-based encryption / RSA / Secret sharing / Cipher / Cryptography / Public-key cryptography / Key management

Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes Nuttapong Attrapadung, Kazukuni Kobara, and Hideki Imai Imai Laboratory, Institute of Industrial Science, University of Tokyo 4-

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
106ElGamal encryption / ID-based encryption / Cipher / Chosen-plaintext attack / RSA / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Semantic security

Simple Functional Encryption Schemes for Inner Products Michel Abdalla, Florian Bourse, Angelo De Caro, and David Pointcheval ´ D´epartement d’Informatique, Ecole normale sup´erieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 08:30:29
107Key management / Security / Applied mathematics / Digital signature / Signcryption / RSA / ID-based encryption / Key / Malleability / Cryptography / Public-key cryptography / Cyberwarfare

A preliminary version of this paper appears in the proceedings of Eurocrypt[removed]This is the full version, which appears as IACR ePrint Archive Record[removed]Key-Versatile Signatures and Applications: RKA, KDM and Jo

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:43
108Cryptography / Red light camera / Street furniture / Transport engineering / Public-key cryptography / ID-based encryption / Speed limit enforcement / Electronic toll collection / Communications protocol / Transport / Road transport / Land transport

The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion Sarah Meiklejohn∗ UC San Diego Keaton Mowery†

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:48:22
109RSA / Cipher / XTR / ID-based encryption / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption Yannis Rouselakis1 and Brent Waters2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 02:06:29
110Public-key cryptography / Symmetric-key algorithm / Disk encryption / Encryption software / Key / ID-based encryption / Block cipher / Encryption / Pretty Good Privacy / Cryptography / Cipher / Key generation

CTO Corner September 2014 Why Encryption Is Essential and How to Address Potential Vulnerabilities Dan Schutzer, Senior Technology Consultant, BITS

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2014-09-23 08:09:57
UPDATE