ID-based cryptography

Results: 183



#Item
131Boneh/Franklin scheme / Standard model / Digital signature / Secure channel / Information security / Key distribution / Cryptography / ID-based encryption / Public-key cryptography

NEW SECURITY NOTIONS FOR IDENTITY BASED ENCRYPTION By Sriramkrishnan Srinivasan

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-04-11 06:48:31
132Encryption / Cipher / Cryptosystem / Key / Probabilistic encryption / Index of cryptography articles / Cryptography / Public-key cryptography / ID-based encryption

C:/Documents and Settings/msah010/Desktop/THESIS/important!!/thesis.dvi

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2012-09-24 07:55:50
133ID-based encryption / Public-key cryptography / Database audit / Key / Computer data logging / Cipher / Proxy server / Cryptography / Computer security / Security

Building an Encrypted and Searchable Audit Log Brent R. Waters1∗, Dirk Balfanz2, Glenn Durfee2, and D. K. Smetters2 1 Princeton University Computer Science Department

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:20:46
134Public-key cryptography / Signcryption / Digital signature / Cipher / Pairing-based cryptography / Key / Proxy re-encryption / Boneh/Franklin scheme / Cryptography / ID-based encryption / ID-based cryptography

Pairing-based Cryptography: Identity Based Encryption and Beyond

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:22:20
135Cryptographic protocols / ElGamal encryption / Cipher / Key / Man-in-the-middle attack / RSA / Diffie–Hellman key exchange / ID-based encryption / Threshold cryptosystem / Cryptography / Public-key cryptography / Key management

Time-Lapse Cryptography Technical Report TR[removed]Michael O. Rabin∗ Christopher Thorpe

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2006-12-20 15:07:12
136Quantum key distribution / Network architecture / Computer network security / Node / Public-key cryptography / Cryptanalysis / Computer security / Telecommunications network / Secure Communication based on Quantum Cryptography / Cryptography / Quantum cryptography / Quantum information science

CONTACT: ROBERT CARRUTHERS • [removed] • [removed] Secure Relaying Protocol with Partial Trust for QKD-Secured Networks TECH ID #: 730.1

Add to Reading List

Source URL: www.innovatecalgary.com

Language: English - Date: 2014-06-10 16:35:17
137Ciphertext indistinguishability / Cipher / Espionage / Security / Cramer–Shoup cryptosystem / Integrated Encryption Scheme / Cryptography / Cyberwarfare / ID-based encryption

Why Proving HIBE Systems Secure is Difficult Allison Lewko Brent Waters Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-17 14:00:59
138Ciphertext / Cipher / RSA / Encryption / Key / Proxy re-encryption / Cryptography / ID-based encryption / Chosen-ciphertext attack

Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption Allison Lewko ∗ University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-26 23:47:37
139Advantage / Ciphertext / Cipher / RSA / Key / Public-key cryptography / Chosen-ciphertext attack / Cryptography / Ciphertext indistinguishability / ID-based encryption

Achieving Leakage Resilience Through Dual System Encryption Allison Lewko ∗ University of Texas at Austin [removed] Yannis Rouselakis

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-26 03:11:13
140Cipher / RSA / Public-key cryptography / Chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Encryption / ID-based encryption

Copyright by Allison Bishop Lewko 2012 The Dissertation Committee for Allison Bishop Lewko

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2012-07-16 23:33:58
UPDATE