Identity-based cryptography

Results: 85



#Item
81Efficient Identity-Based Encryption Without Random Oracles Brent Waters

Efficient Identity-Based Encryption Without Random Oracles Brent Waters

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-11 13:45:26
82Attribute-Based Encryption: Using Identity-Based Encryption for Access Control

Attribute-Based Encryption: Using Identity-Based Encryption for Access Control

Add to Reading List

Source URL: www.emc.com

Language: English
83Strongly-Secure Identity-based Key Agreement and Anonymous Extension Sherman S.M. Chow1 and Kim-Kwang Raymond Choo2,

Strongly-Secure Identity-based Key Agreement and Anonymous Extension Sherman S.M. Chow1 and Kim-Kwang Raymond Choo2,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-01-03 02:55:34
84An Identity Based Encryption Scheme based on Quadratic Residues Clifford Cocks

An Identity Based Encryption Scheme based on Quadratic Residues Clifford Cocks

Add to Reading List

Source URL: www.ime.usp.br

Language: English - Date: 2004-02-20 08:26:44
85Identity-based Chameleon Hash and Applications Giuseppe Ateniese Breno de Medeiros

Identity-based Chameleon Hash and Applications Giuseppe Ateniese Breno de Medeiros

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-03-15 18:18:40