ID-based encryption

Results: 182



#Item
171Ciphertext indistinguishability / Semantic security / ElGamal encryption / Advantage / RSA / Cipher / Diffie–Hellman key exchange / XTR / Chosen-ciphertext attack / Cryptography / Public-key cryptography / ID-based encryption

Appears in SIAM J. of Computing, Vol. 32, No. 3, pp[removed], 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 213–229, Springer-Verlag, 2001.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-06-04 16:24:14
172ID-based encryption / Ciphertext indistinguishability / RSA / Semantic security / Cipher / Advanced Encryption Standard / Cryptography / Homomorphic encryption / Verifiable computing

PDF Document

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
173ID-based encryption / Cipher / Probabilistic encryption / Entropic security / Cryptography / Ciphertext indistinguishability / Semantic security

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-04 02:57:54
174Applied mathematics / Security / ID-based encryption / Advantage / RSA / Cipher / Cryptography / Public-key cryptography / Cyberwarfare

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-03 14:20:24
175ID-based encryption / ID-based cryptography / Certificate-based encryption / Digital signature / Key / Diffie–Hellman key exchange / Public key infrastructure / Certificateless cryptography / Cryptography / Key management / Public-key cryptography

PDF Document

Add to Reading List

Source URL: crpit.com

Language: English - Date: 2012-01-19 01:27:31
176Public-key cryptography / NTRUSign / Lamport signature / NTRU / Digital signature / Lattice-based cryptography / Merkle signature scheme / ID-based encryption / Key / Cryptography / Post-quantum cryptography / Key management

PDF Document

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2009-04-08 18:56:03
177ID-based encryption / RSA / Group signature / Asiacrypt / Eurocrypt / Index of cryptography articles / Diffie–Hellman problem / Cryptography / Public-key cryptography / International Cryptology Conference

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2013-09-18 16:03:32
178Finite fields / Elliptic curves / Cryptographic protocols / Elliptic curve cryptography / Supersingular elliptic curve / Elliptic curve / SPEKE / ID-based encryption / Weil pairing / Abstract algebra / Cryptography / Algebra

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-10 06:55:07
179ID-based encryption / Cipher / Semantic security / Broadcast encryption / RSA / Chosen-plaintext attack / Authenticated encryption / Cryptography / Public-key cryptography / Ciphertext

PDF Document

Add to Reading List

Source URL: perso.univ-rennes1.fr

Language: English - Date: 2013-02-21 17:00:27
180Public-key cryptography / IEEE P1363 / ID-based encryption / IEEE Standards Association / Pairing / Proxy re-encryption / Institute of Electrical and Electronics Engineers / Cryptographic primitive / Signcryption / Cryptography / IEEE standards / Standards organizations

PDF Document

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-05-13 13:20:44
UPDATE