ID-based cryptography

Results: 183



#Item
81Wireless ad-hoc network / Mobile ad hoc network / Key distribution / ID-based encryption / Public-key cryptography / Wireless sensor network / Support / Routing / Wireless mesh network / Wireless networking / Technology / Telecommunications engineering

Evaluation of Key Management in ad hoc Networks for Emergency and Rescue Operations (Extended Abstract) A. M. Hegland * E. Winjum* Ø. Kure† S.F.Mjølsnes† C. Rong§ P. Spilling* *UniK – University Graduate Center

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2005-12-08 10:12:47
82Advantage / Chosen-ciphertext attack / Public-key cryptography / Cipher / Chosen-plaintext attack / Encryption / Semantic security / Cryptography / Ciphertext indistinguishability / ID-based encryption

Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack Junzuo Lai⋆ , Robert H. Deng⋆⋆ , Shengli Liu⋆ ⋆ ⋆ , Jian Weng† , and Yunlei Zhao‡ Abstract. Security against selective o

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-29 21:25:11
83Cipher / ID-based encryption / Vector space / Function / Cramer–Shoup cryptosystem / Algebra / Mathematics / Cryptography

Dual System Encryption via Predicate Encodings Hoeteck Wee⋆ ENS, Paris, France Abstract. We introduce the notion of predicate encodings, an information-theoretic primitive reminiscent of linear secret-sharing that in a

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-23 14:03:35
84Ciphertext / Cryptography / Learning with errors / ID-based encryption

Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal1 , David Mandell Freeman2 , and Vinod Vaikuntanathan3 1 UCLA,

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2012-01-10 00:25:27
85Key management / ID-based encryption / Delay-tolerant networking / ID-based cryptography / Security token / Tor / Public key infrastructure / Data Mule / Roaming / Cryptography / Network architecture / Public-key cryptography

Practical Security for Disconnected Nodes Aaditeshwar Seth Srinivasan Keshav School of Computer Science University of Waterloo, Canada {a3seth, keshav}@uwaterloo.ca

Add to Reading List

Source URL: www.cse.iitd.ernet.in

Language: English - Date: 2006-03-26 21:15:04
86ID-based encryption / Secrecy / Homomorphic encryption / Ciphertext indistinguishability / RSA / Semantic security / Cipher / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Cyberwarfare / Security

Functional Encryption from (Small) Hardware Tokens Kai-Min Chung1? , Jonathan Katz2?? , and Hong-Sheng Zhou3? ? ? 1 Academia Sinica, [removed] University of Maryland, [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-23 14:57:23
87Internet privacy / Computer-mediated communication / Spamming / Cryptography / S/MIME / Pretty Good Privacy / Phishing / Internet security / ID-based encryption / Computing / Internet / Email

Microsoft Word - EMailNeppeTe40091115.doc

Add to Reading List

Source URL: nma.com

Language: English - Date: 2009-11-15 20:55:05
88Computer architecture / Network protocols / Delay-tolerant networking / Internet privacy / ID-based encryption / Data Mule / Security token / Tor / Cisco IOS / Network architecture / Computing / Cryptography

Practical Security for Disconnected Nodes Aaditeshwar Seth Urs Hengartner Srinivasan Keshav School of Computer Science

Add to Reading List

Source URL: www.cse.iitd.ernet.in

Language: English - Date: 2006-03-26 21:10:58
89Computing / Public-key cryptography / Email / PGP / Pretty Good Privacy / ID-based encryption / Hushmail / Internet security / Secure communication / Cryptography / Internet privacy / Internet

REPRINT Ed Gerck: “Secure Email Technologies X[removed]PKI, PGP, IBE, and ZMAIL”, in Chapter 12, Corporate Email Management, S. J. Krishna and Elizabeth Raju (Ed.), ICFAI University Press, 2007, pp[removed], ISBN 81-31

Add to Reading List

Source URL: nma.com

Language: English - Date: 2009-01-09 03:09:23
90ID-based encryption / Ciphertext / Lattice / Ideal lattice cryptography / Rabin cryptosystem / Cryptography / RSA / Learning with errors

Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal∗ University of California, Los Angeles, USA [removed]

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2011-09-02 00:42:27
UPDATE