ID-based encryption

Results: 182



#Item
141RSA / XTR / Ciphertext / ID-based encryption / Running key cipher / Cipher / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques Brent Waters † University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-08 21:20:23
142Linear algebra / Cryptography / Group theory / Computational hardness assumptions / Transpose / XTR / Decision Linear assumption / Inner product space / ID-based encryption / Algebra / Mathematics / Abstract algebra

Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting Allison Lewko ∗ The University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-18 02:15:43
143RSA / Boneh/Franklin scheme / Cipher / Advantage / Chosen-ciphertext attack / Cryptography / ID-based encryption / Ciphertext

New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts Allison Lewko ∗ University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-29 23:19:39
144Cipher / Public-key cryptography / Key / ID-based encryption / Chosen-ciphertext attack / Cryptography / RSA / Ciphertext

Decentralizing Attribute-Based Encryption Brent Waters † University of Texas at Austin [removed] Allison Lewko ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-08-04 16:35:50
145Ciphertext / Cipher / Key / Public-key cryptography / Cryptography / ID-based encryption / RSA

Unbounded HIBE and Attribute-Based Encryption Brent Waters † University of Texas at Austin [removed] Allison Lewko ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-26 03:08:57
146Semantic security / XTR / ID-based encryption / Security / Applied mathematics / Cramer–Shoup cryptosystem / Cryptography / Ciphertext indistinguishability / Cyberwarfare

Witness Encryption from Instance Independent Assumptions Craig Gentry IBM Research, T.J. Watson [removed] Allison Bishop Lewko

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-30 01:07:28
147Cryptographic protocol / ID-based encryption / Group signature / Scheme / Cryptography / ECRYPT / Public-key cryptography

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-05-04 11:35:10
148ID-based encryption / Elliptic curve cryptography / Cryptographic protocol / RSA / PKCS / Random oracle / Digital signature / Cryptanalysis / Encryption / Cryptography / Public-key cryptography / Radio-frequency identification

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-03-26 13:20:40
149Homomorphic encryption / Database schema / Public-key cryptography / Random oracle / ID-based encryption / Cryptography / Ciphertext indistinguishability / Obfuscation

Towards a Unified Theory of Cryptographic Agents Shashank Agrawal ∗ Shweta Agrawal

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-06-23 06:42:41
UPDATE