ID-based encryption

Results: 182



#Item
11Elliptic curve cryptography / Pairing-based cryptography / Public-key cryptography / Group theory / Finite fields / Tate pairing / Hyperelliptic curve / Weil pairing / BonehLynnShacham / BonehFranklin scheme / Pairing / ID-based encryption

Bilinear Pairings in Cryptography Master thesis #603 by

Add to Reading List

Source URL: www.math.ru.nl

Language: English - Date: 2009-07-13 10:25:27
12Cryptography / Identity-based cryptography / Public-key cryptography / Elliptic curve cryptography / Pairing-based cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / ID-based encryption / Advantage / Encryption / BonehFranklin scheme / Ciphertext

Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands.

Add to Reading List

Source URL: www.dgalindo.es

Language: English - Date: 2007-11-26 10:35:37
13

Published In W. Meier and D. Mukhopadhyay, Eds., Progress in Cryptology − INDOCRYPT 2014, volof Lecture Notes in Computer Science, p. XXI, Springer, 2014. Recent Advances in ID-based Encryption (Invited Talk) Ma

Add to Reading List

Source URL: joye.site88.net

- Date: 2015-09-04 19:43:52
    14

    Trapdoors for Lattices: Signatures, ID-Based Encryption, and Beyond Chris Peikert Georgia Institute of Technology

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2015-09-08 16:32:01
      15Public-key cryptography / E-commerce / Key management / Public key infrastructure / Secure communication / Cryptographic primitive / ID-based encryption / Cryptography / Cryptographic protocol / Zero-knowledge proof / Public key certificate / Digital signature

      ESORICS 2015 Program Guide ESORICS only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.org

      Add to Reading List

      Source URL: esorics2015.sba-research.org

      Language: English - Date: 2015-09-22 04:03:47
      16

      Trapdoors for Lattices: Signatures, ID-Based Encryption, and Beyond Chris Peikert Georgia Institute of Technology

      Add to Reading List

      Source URL: www.di.ens.fr

      Language: English - Date: 2010-05-29 17:36:29
        17Cryptography / Public-key cryptography / Identity-based cryptography / Chosen-ciphertext attack / Authenticated encryption / ID-based encryption / Encryption / RSA / Cipher / Ciphertext indistinguishability / Chosen-plaintext attack / Semantic security

        Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

        Add to Reading List

        Source URL: www-users.cs.umn.edu

        Language: English - Date: 2009-03-17 15:01:03
        UPDATE