ID-based encryption

Results: 182



#Item
31Intel Core / Cryptography / Boneh/Franklin scheme / ID-based encryption

Verifiable Security of Boneh-Franklin Identity-Based Encryption⋆ Gilles Barthe, Federico Olmedo, and Santiago Zanella B´eguelin {Gilles.Barthe,Federico.Olmedo,Santiago.Zanella}@imdea.org IMDEA Software Institute, Madr

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
32Kerberos / Key / Certificate authority / Symmetric-key algorithm / ID-based encryption / Cryptographic key types / Cryptography / Key management / Public-key cryptography

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
33Cryptography / ID-based encryption / Dan Boneh

Overview of the results The Framework Work in progress Simple Functional Encryption Schemes for Inner Products

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-27 08:27:56
34Cyberwarfare / Applied mathematics / Digital signature / RSA / ID-based encryption / Information security / Elliptic curve cryptography / Cryptography / Public-key cryptography / Security

1 BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems Attila A. Yavuz and Peng Ning Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:58
35Security / Applied mathematics / Signcryption / Digital signature / Cipher / Elliptic curve cryptography / ID-based encryption / Cryptography / Public-key cryptography / Cyberwarfare

1 Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks Attila Altay Yavuz and Peng Ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:12
36ID-based encryption / Public-key cryptography / Database audit / Key / Computer data logging / Cipher / Proxy server / Cryptography / Computer security / Security

Building an Encrypted and Searchable Audit Log Brent R. Waters1∗, Dirk Balfanz2, Glenn Durfee2, and D. K. Smetters2 1 Princeton University Computer Science Department

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:31
37Public-key cryptography / Key encapsulation / Ciphertext indistinguishability / Cipher / Cryptographic protocol / Semantic security / Key / Standard model / Transport Layer Security / Cryptography / ID-based encryption / Advantage

Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement Dario Fiore1? , Rosario Gennaro2 , and Nigel P. Smart3 ´ Ecole Normale Sup´erieure,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-30 11:15:58
38Diffie–Hellman problem / Key-agreement protocol / Public-key cryptography / Key exchange / Elliptic curve cryptography / ID-based encryption / Internet Key Exchange / Boneh/Franklin scheme / Elliptic curve Diffie–Hellman / Cryptographic protocols / Cryptography / Diffie–Hellman key exchange

Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 06:49:50
39Year of birth missing / ID-based encryption / Association for Computing Machinery / Computer science / Infosys / Pairing-based cryptography / RSA / IEEE P1363 / Cryptography / Public-key cryptography / Dan Boneh

EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

Add to Reading List

Source URL: awards.acm.org

Language: English - Date: 2015-03-30 18:10:52
40Year of birth missing / ID-based encryption / Association for Computing Machinery / Computer science / Infosys / Pairing-based cryptography / RSA / IEEE P1363 / Cryptography / Public-key cryptography / Dan Boneh

The Tennessee Open Meetings Act passed by the General Assembly in 1974 requires that meetings of state, city and county government bodies be open to the public and that any such governmental body give adequate public not

Add to Reading List

Source URL: health.state.tn.us

Language: English - Date: 2015-03-27 14:41:02
UPDATE