Identity-based cryptography

Results: 85



#Item
41Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application Yumiko Hanaoka∗, Goichiro Hanaoka†, Junji Shikata‡and Hideki Imai§ December 12, 2005  Abstract

Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application Yumiko Hanaoka∗, Goichiro Hanaoka†, Junji Shikata‡and Hideki Imai§ December 12, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-12 03:12:37
42Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures∗ Siamak F Shahandashti   

Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures∗ Siamak F Shahandashti  

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-05 21:04:21
43Breaking An Identity-Based Encryption Scheme based on DHIES Martin R. Albrecht1 and Kenneth G. Paterson2? 1 INRIA, Paris-Rocquencourt Center, SALSA Project UPMC Univ Paris 06, UMR 7606, LIP6, F-75005, Paris, France CNRS,

Breaking An Identity-Based Encryption Scheme based on DHIES Martin R. Albrecht1 and Kenneth G. Paterson2? 1 INRIA, Paris-Rocquencourt Center, SALSA Project UPMC Univ Paris 06, UMR 7606, LIP6, F-75005, Paris, France CNRS,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-08-30 13:51:52
44SSO Plugin Case study: Integrating with Ping Federate J System Solutions http://www.javasystemsolutions.com Version 4.0

SSO Plugin Case study: Integrating with Ping Federate J System Solutions http://www.javasystemsolutions.com Version 4.0

Add to Reading List

Source URL: www.javasystemsolutions.com

Language: English - Date: 2014-01-20 14:08:32
45SSO Plugin Case study: Integrating with Ping Federate J System Solutions http://www.javasystemsolutions.com Version 4.0

SSO Plugin Case study: Integrating with Ping Federate J System Solutions http://www.javasystemsolutions.com Version 4.0

Add to Reading List

Source URL: www.javasystemsolutions.com

Language: English - Date: 2014-01-20 14:08:32
46Bilinear Pairings in Cryptography:  Identity Based Encryption Dan Boneh Stanford University

Bilinear Pairings in Cryptography: Identity Based Encryption Dan Boneh Stanford University

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-05-27 15:07:17
47Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack Junzuo Lai⋆ , Robert H. Deng⋆⋆ , Shengli Liu⋆ ⋆ ⋆ , Jian Weng† , and Yunlei Zhao‡ Abstract. Security against selective o

Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack Junzuo Lai⋆ , Robert H. Deng⋆⋆ , Shengli Liu⋆ ⋆ ⋆ , Jian Weng† , and Yunlei Zhao‡ Abstract. Security against selective o

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-29 21:25:11
48TS[removed]V12[removed]Smart Cards; Remote APDU structure for UICC based applications (Release 12)

TS[removed]V12[removed]Smart Cards; Remote APDU structure for UICC based applications (Release 12)

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-02-19 09:07:40
49LOSSY Identity-based (Lossy) Trapdoor Functions and Applications  Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters

LOSSY Identity-based (Lossy) Trapdoor Functions and Applications Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-21 02:35:56
50Using Identity-Based Encryption to Eliminate Certificates in SSL Transactions

Using Identity-Based Encryption to Eliminate Certificates in SSL Transactions

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-07-18 00:26:34