ID-based encryption

Results: 182



#Item
161Key / Symmetric-key algorithm / Probabilistic encryption / Message authentication code / Digital signature / ID-based encryption / Integrated Encryption Scheme / Cryptography / Key management / Public-key cryptography

RZ 3628 (# [removed]Computer Science 16 pages

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2006-06-29 07:25:33
162Digital signature / Key / Cryptographic hash function / Probabilistic encryption / Message authentication code / Symmetric-key algorithm / RSA / ID-based encryption / Signcryption / Cryptography / Key management / Public-key cryptography

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-12-20 13:03:42
163Theoretical computer science / Formal sciences / ACM SIGACT / International Colloquium on Automata /  Languages and Programming / Gödel Prize / Whitfield Diffie / Association for Computing Machinery / ID-based encryption / Dan Boneh / Cryptography / Computer science / Applied mathematics

Contacts: Paul Beame ACM SIGACT Chair

Add to Reading List

Source URL: www.eatcs.org

Language: English - Date: 2014-01-29 10:45:05
164Key encapsulation / Electronic commerce / ID-based encryption / Optimal asymmetric encryption padding / Key size / RSA / Symmetric-key algorithm / XTR / ID-based cryptography / Cryptography / Key management / Public-key cryptography

SK-KEM : AN IDENTITY-BASED KEM M. BARBOSA, L. CHEN, Z. CHENG, M. CHIMLEY, A. DENT, P. FARSHIM, K. HARRISON, J. MALONE-LEE, N.P. SMART, AND F. VERCAUTEREN

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:53:36
165Cyberwarfare / Boneh/Franklin scheme / XTR / Advantage / Polynomial / Security / Applied mathematics / Cryptography / Ciphertext indistinguishability / ID-based encryption

Security Proof of Sakai-Kasahara’s Identity-Based Encryption Scheme Liqun Chen1 and Zhaohui Cheng2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-08-31 15:06:27
166ID-based encryption / Forcing / Semantic security / Diffie–Hellman problem / Cryptography / Boneh/Franklin scheme / Advantage

Efficient Identity-Based Encryption Without Random Oracles Brent Waters

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-11 13:45:26
167Key management / Authorization certificate / ID-based encryption / Public key certificate / X.509 / Attribute grammar / RSA / Certificate authority / Ciphertext / Cryptography / Public-key cryptography / Electronic commerce

Attribute-Based Encryption: Using Identity-Based Encryption for Access Control

Add to Reading List

Source URL: www.emc.com

Language: English
168ID-based encryption / Certificate-based encryption / Crypt / Ciphertext / ID-based cryptography / Proxy re-encryption / Cryptography / Public-key cryptography / Electronic commerce

Certificate-Based Encryption and the Certificate Revocation Problem

Add to Reading List

Source URL: www.cis.nctu.edu.tw

Language: English - Date: 2003-06-03 09:36:43
169Diffie–Hellman problem / Group signature / Digital signature / ID-based encryption / Weil pairing / Pairing / RSA / Diffie–Hellman key exchange / Public-key cryptography / Cryptography / BLS / Pairing-based cryptography

Short Signature Scheme From Bilinear Pairings Sedat Akleylek , Barı¸s B¨ ulent Kırlar

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2009-06-09 04:23:16
170Public-key cryptography / Secure messaging / S/MIME / Email encryption / Public key infrastructure / Encryption / Secure communication / ID-based encryption / Deniable encryption / Cryptography / Internet privacy / Email

A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology in a Health Care Trial

Add to Reading List

Source URL: www.hpl.hp.com

Language: English - Date: 2003-02-20 13:23:10
UPDATE