ID-based encryption

Results: 182



#Item
61Quantum key distribution / Id Quantique / Key distribution / Advanced Encryption Standard / Wireless security / Secure Communication based on Quantum Cryptography / Cryptography / Quantum cryptography / Quantum information science

USER CASE REDEFINING SECURITY QKD as a Service Colt & IDQ provide Managed Quantum Cryptography Service for high-security network encryption in Switzerland

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:13
62Public-key cryptography / Cocks IBE scheme / Ciphertext indistinguishability / XTR / Diffie–Hellman key exchange / Random oracle / Cipher / Boneh/Franklin scheme / Feistel cipher / Cryptography / ID-based encryption / Advantage

On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-12 12:17:42
63Security / Cipher / Advantage / ID-based encryption / XTR / Applied mathematics / Integrated Encryption Scheme / Cryptography / Cyberwarfare / Ciphertext indistinguishability

Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions Cheng Chen, Zhenfeng Zhang, and Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-20 20:36:43
64Key distribution / Wireless sensor network / ID-based encryption / Public-key cryptography / Key-agreement protocol / Pairing-based cryptography / Sensor node / Key / Elliptic curve cryptography / Cryptography / Key management / Cryptographic protocols

TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks Leonardo B. Oliveira UNICAMP, Brazil

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-01-07 17:26:25
65Mathematics / Electronic commerce / ID-based encryption / RSA / Multilinear map / Ribe / Bilinear map / ID-based cryptography / Cryptography / Public-key cryptography / Multilinear algebra

New Constructions of Revocable Identity-Based Encryption from Multilinear Maps Seunghwan Park∗ Kwangsu Lee†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-01 20:30:36
66Computational hardness assumptions / Diffie–Hellman key exchange / Diffie–Hellman problem / Weil pairing / ID-based encryption / Password authentication protocol / Public-key cryptography / Boneh/Franklin scheme / Cryptography / Cryptographic protocols / Finite fields

Improvement of Ma ni ke ta l .

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 05:56:33
67Post-quantum cryptography / Digital signature / Group signature / Ring signature / RSA / Digital Signature Algorithm / Key / Random oracle / ID-based encryption / Cryptography / Public-key cryptography / Key management

Solutions to Key Exposure Problem in Ring Signature Joseph K. Liu1 , and Duncan S. Wong2 1 Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-23 05:46:43
68ID-based encryption / Advantage / Certificate-based encryption / Ciphertext / Standard model / ID-based cryptography / RSA / Cipher / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

Lecture Notes in Computer Science:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-04 06:00:47
69XTR / ID-based encryption / Diffie–Hellman key exchange / Weil pairing / RSA / Cyberwarfare / Mathematics / Applied mathematics / Cryptographic protocols / Cryptography / Public-key cryptography

Microsoft Word - Weakness of shim’s New ID-based tripartite multiple-key agreement protocol最終版.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-13 03:19:10
70Ciphertext indistinguishability / Semantic security / RSA / Hybrid cryptosystem / Adaptive chosen-ciphertext attack / Public-key cryptography / Chosen-ciphertext attack / Key / Cipher / Cryptography / Key encapsulation / ID-based encryption

Secure Cryptographic Workflow in the Standard Model M. Barbosa1 and P. Farshim2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-28 08:58:14
UPDATE