ID-based encryption

Results: 182



#Item
111Public-key cryptography / Symmetric-key algorithm / Disk encryption / Encryption software / Key / ID-based encryption / Block cipher / Encryption / Pretty Good Privacy / Cryptography / Cipher / Key generation

CTO Corner September 2014 Why Encryption Is Essential and How to Address Potential Vulnerabilities Dan Schutzer, Senior Technology Consultant, BITS

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2014-09-23 08:09:57
112Post-quantum cryptography / Standards organizations / Public-key cryptography / NTRU / ID-based encryption / Institute of Electrical and Electronics Engineers / Pairing / Cryptography / IEEE standards / IEEE P1363

IEEE P1363.3: Standard for Identity-Based Cryptographic Techniques using Pairings CALL FOR SUBMISSIONS Contributions are requested for the IEEE P1363.3 project, "Standard for Identity-Based Cryptographic Techniques usin

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:53:33
113Mathematics / Boneh/Franklin scheme / Pairing / XTR / Supersingular elliptic curve / Elliptic curve / ID-based encryption / RSA / Weil pairing / Abstract algebra / Cryptography / Algebra

FAULT ATTACKS ON PAIRING-BASED PROTOCOLS REVISITED SANJIT CHATTERJEE, KORAY KARABINA, AND ALFRED MENEZES Abstract. Several papers have studied fault attacks on computing a pairing value e(P, Q), where P is a public point

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-06-20 19:35:34
114ID-based encryption / Cipher / Adaptive chosen-ciphertext attack / Semantic security / Cryptography / Ciphertext indistinguishability / RSA

Fully Secure Functional Encryption without Obfuscation Sanjam Garg∗ Craig Gentry† Shai Halevi‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-12 08:24:27
115Computer-mediated communication / Internet privacy / Cryptography / Cryptographic software / Email client / Pretty Good Privacy / S/MIME / ID-based encryption / Key server / Email / Internet / Computing

CPA Security Characteristic

Add to Reading List

Source URL: www.cesg.gov.uk

Language: English - Date: 2012-05-16 00:21:48
116ID-based encryption / Block cipher modes of operation / RSA / Cramer–Shoup cryptosystem / Authenticated encryption / Cryptography / Public-key cryptography / Cipher

Remarks on the Cryptographic Primitive of Attribute-based Encryption Zhengjun Cao1 , Lihua Liu2,∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-15 01:22:56
117Cyberwarfare / Computer security / Security / RSA / Email encryption / Boneh/Franklin scheme / Cryptography / Public-key cryptography / ID-based encryption

Identity Based Encryption Terence Spies VP Engineering [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
118Obfuscation / Obfuscated code / Homomorphic encryption / Zero-knowledge proof / RSA / ID-based encryption / Encryption / Cryptography / Ciphertext indistinguishability / Semantic security

Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits Sanjam Garg UCLA [removed] Mariana Raykova

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-21 10:06:46
119X.509 / ID-based encryption / Public key infrastructure / Authentication server / Revocation list / Certificate authority / Kerberos / Public key certificate / Authentication / Cryptography / Public-key cryptography / Key management

A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication∗ Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, and Geraint Price Information Security Group Royal Holloway, University

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2007-04-13 09:22:49
120Electronic commerce / ID-based encryption / ID-based cryptography / Clifford Cocks / Key / RSA / Public key infrastructure / Boneh/Franklin scheme / Certificate-based encryption / Cryptography / Key management / Public-key cryptography

Identity-Based Encryption with Conventional Public-Key Cryptography

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-02-23 11:34:53
UPDATE