ID-based encryption

Results: 182



#Item
121Cryptographic protocols / Internet standards / Public key infrastructure / Revocation list / X.509 / ID-based encryption / Online Certificate Status Protocol / SCVP / Public key certificate / Cryptography / Public-key cryptography / Key management

An Analysis of PKI Issues and Proposed Alternatives

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2004-03-24 17:13:10
122ID-based encryption / Public key infrastructure / Key generation / X.509 / Key / ID-based cryptography / Pretty Good Privacy / Cryptography / Public-key cryptography / Key management

Identity-Based Encryption with Conventional Public-Key Infrastructure Jon Callas PKI ‘05

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-04-20 03:22:08
123Email authentication / Internet privacy / Anti-spam / Proofpoint /  Inc. / Spam filtering / S/MIME / Encryption / ID-based encryption / Email / Cryptography / Computer security / Computing

Tile Goes Here Sendmail Encryption Policy-Based Encryption with Voltage IBE

Add to Reading List

Source URL: www.proofpoint.com

Language: English - Date: 2014-03-24 16:34:40
124Chosen-ciphertext attack / Cipher / RSA / ID-based encryption / Advantage / Public-key cryptography / Chosen-plaintext attack / Cryptography / Ciphertext indistinguishability / Authenticated encryption

Time-Specific Encryption? Kenneth G. Paterson and Elizabeth A. Quaglia Information Security Group, Royal Holloway, University of London, [removed], [removed]

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-06-25 03:14:09
125Applied mathematics / Security / ID-based encryption / RSA / ElGamal encryption / Cipher / Advantage / Cryptography / Public-key cryptography / Cyberwarfare

CBE from CL-PKE: A Generic Construction and Efficient Schemes Sattam S. Al-Riyami and Kenneth G. Paterson Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-11-08 04:27:00
126Applied mathematics / Ciphertext indistinguishability / Public-key cryptography / Semantic security / RSA / Cipher / ID-based encryption / Probabilistic encryption / Authenticated encryption / Cryptography / Cyberwarfare / Security

Function-Private Functional Encryption in the Private-Key Setting Zvika Brakerski∗ Gil Segev†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-24 01:51:53
127Adaptive chosen-ciphertext attack / Malleability / Chosen-ciphertext attack / RSA / Advantage / Chosen-plaintext attack / ID-based encryption / Paillier cryptosystem / Cramer–Shoup cryptosystem / Cryptography / Ciphertext indistinguishability / Semantic security

Bounded CCA2-Secure Encryption Ronald Cramer1,2 , Goichiro Hanaoka3 , Dennis Hofheinz1 , Hideki Imai3,4 , Eike Kiltz1 , Rafael Pass5 , abhi shelat6 , and Vinod Vaikuntanathan7 1 3

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:49
128Electronic commerce / Cyberwarfare / RSA / Lattice / Learning with errors / ID-based encryption / Applied mathematics / Ideal lattice cryptography / Rabin cryptosystem / Cryptography / Public-key cryptography / Mathematics

Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal∗ University of California, Los Angeles [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-08-16 17:16:58
129Advanced Encryption Standard / Cipher / Entropic security / Cryptography / Ciphertext indistinguishability / ID-based encryption

Functional Encryption: New Perspectives and Lower Bounds Shweta Agrawal ∗ Sergey Gorbunov†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-10-01 16:31:30
130Vehicle Identification Number / Stool-or-mat / Vulture / Bread bun / Egyptian hieroglyphs / Cryptography / ID-based encryption

An extended abstract of this work appeared in the proceedings of CRYPTO[removed]This is the full version. (Hierarchical) Identity-Based Encryption from Affine Message Authentication Olivier Blazy1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-25 11:30:50
UPDATE