ID-based cryptography

Results: 183



#Item
121ID-based encryption / Public key infrastructure / Key generation / X.509 / Key / ID-based cryptography / Pretty Good Privacy / Cryptography / Public-key cryptography / Key management

Identity-Based Encryption with Conventional Public-Key Infrastructure Jon Callas PKI ‘05

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-04-20 03:22:08
122Email authentication / Internet privacy / Anti-spam / Proofpoint /  Inc. / Spam filtering / S/MIME / Encryption / ID-based encryption / Email / Cryptography / Computer security / Computing

Tile Goes Here Sendmail Encryption Policy-Based Encryption with Voltage IBE

Add to Reading List

Source URL: www.proofpoint.com

Language: English - Date: 2014-03-24 16:34:40
123Chosen-ciphertext attack / Cipher / RSA / ID-based encryption / Advantage / Public-key cryptography / Chosen-plaintext attack / Cryptography / Ciphertext indistinguishability / Authenticated encryption

Time-Specific Encryption? Kenneth G. Paterson and Elizabeth A. Quaglia Information Security Group, Royal Holloway, University of London, [removed], [removed]

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-06-25 03:14:09
124Applied mathematics / Security / ID-based encryption / RSA / ElGamal encryption / Cipher / Advantage / Cryptography / Public-key cryptography / Cyberwarfare

CBE from CL-PKE: A Generic Construction and Efficient Schemes Sattam S. Al-Riyami and Kenneth G. Paterson Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-11-08 04:27:00
125Applied mathematics / Ciphertext indistinguishability / Public-key cryptography / Semantic security / RSA / Cipher / ID-based encryption / Probabilistic encryption / Authenticated encryption / Cryptography / Cyberwarfare / Security

Function-Private Functional Encryption in the Private-Key Setting Zvika Brakerski∗ Gil Segev†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-24 01:51:53
126Adaptive chosen-ciphertext attack / Malleability / Chosen-ciphertext attack / RSA / Advantage / Chosen-plaintext attack / ID-based encryption / Paillier cryptosystem / Cramer–Shoup cryptosystem / Cryptography / Ciphertext indistinguishability / Semantic security

Bounded CCA2-Secure Encryption Ronald Cramer1,2 , Goichiro Hanaoka3 , Dennis Hofheinz1 , Hideki Imai3,4 , Eike Kiltz1 , Rafael Pass5 , abhi shelat6 , and Vinod Vaikuntanathan7 1 3

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:49
127Electronic commerce / Cyberwarfare / RSA / Lattice / Learning with errors / ID-based encryption / Applied mathematics / Ideal lattice cryptography / Rabin cryptosystem / Cryptography / Public-key cryptography / Mathematics

Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal∗ University of California, Los Angeles [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-08-16 17:16:58
128Advanced Encryption Standard / Cipher / Entropic security / Cryptography / Ciphertext indistinguishability / ID-based encryption

Functional Encryption: New Perspectives and Lower Bounds Shweta Agrawal ∗ Sergey Gorbunov†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-10-01 16:31:30
129Vehicle Identification Number / Stool-or-mat / Vulture / Bread bun / Egyptian hieroglyphs / Cryptography / ID-based encryption

An extended abstract of this work appeared in the proceedings of CRYPTO[removed]This is the full version. (Hierarchical) Identity-Based Encryption from Affine Message Authentication Olivier Blazy1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-25 11:30:50
130X.509 / ID-based encryption / Public key infrastructure / Authentication server / Revocation list / Certificate authority / Kerberos / Public key certificate / Authentication / Cryptography / Public-key cryptography / Key management

A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication∗ Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, and Geraint Price Information Security Group Royal Holloway, University

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2007-03-15 09:46:20
UPDATE