ID-based cryptography

Results: 183



#Item
11Elliptic curve cryptography / Pairing-based cryptography / Public-key cryptography / Group theory / Finite fields / Tate pairing / Hyperelliptic curve / Weil pairing / BonehLynnShacham / BonehFranklin scheme / Pairing / ID-based encryption

Bilinear Pairings in Cryptography Master thesis #603 by

Add to Reading List

Source URL: www.math.ru.nl

Language: English - Date: 2009-07-13 10:25:27
12Cryptography / Identity-based cryptography / Public-key cryptography / Elliptic curve cryptography / Pairing-based cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / ID-based encryption / Advantage / Encryption / BonehFranklin scheme / Ciphertext

Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands.

Add to Reading List

Source URL: www.dgalindo.es

Language: English - Date: 2007-11-26 10:35:37
13

Published in ACM Operating Systems Review 32(4):33–39, ID-based Secret-Key Cryptography? Marc Joye and Sung-Ming Yen Laboratory of Cryptography and Information Security Dept of Electrical Engineering, Tamkang Un

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2015-09-04 19:44:06
    14Public-key cryptography / E-commerce / Key management / Public key infrastructure / Secure communication / Cryptographic primitive / ID-based encryption / Cryptography / Cryptographic protocol / Zero-knowledge proof / Public key certificate / Digital signature

    ESORICS 2015 Program Guide ESORICS only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.org

    Add to Reading List

    Source URL: esorics2015.sba-research.org

    Language: English - Date: 2015-09-22 04:03:47
    15Cryptography / Public-key cryptography / Identity-based cryptography / Chosen-ciphertext attack / Authenticated encryption / ID-based encryption / Encryption / RSA / Cipher / Ciphertext indistinguishability / Chosen-plaintext attack / Semantic security

    Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2009-03-17 15:01:03
    16Digital signature / ID-based encryption / RSA / Cryptography / Public-key cryptography / Ciphertext indistinguishability

    An extended abstract of this paper is published in the proceedings of ASIACRYPTSignature Schemes Secure against Hard-to-Invert Leakage Sebastian Faust∗, Carmit Hazay†,

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-12-29 12:12:28
    17Malleability / ID-based encryption / Advantage / Chosen-plaintext attack / Cipher / Ciphertext indistinguishability / Semantic security / Cryptography / Chosen-ciphertext attack / RSA

    Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts∗ Duong-Hieu Phan 1,2,3 Siamak F. Shahandashti 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-07-23 20:29:45
    UPDATE