<--- Back to Details
First PageDocument Content
ID-based encryption / Certificate-based encryption / Crypt / Ciphertext / ID-based cryptography / Proxy re-encryption / Cryptography / Public-key cryptography / Electronic commerce
Date: 2003-06-03 09:36:43
ID-based encryption
Certificate-based encryption
Crypt
Ciphertext
ID-based cryptography
Proxy re-encryption
Cryptography
Public-key cryptography
Electronic commerce

Certificate-Based Encryption and the Certificate Revocation Problem

Add to Reading List

Source URL: www.cis.nctu.edu.tw

Download Document from Source Website

File Size: 434,38 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Proxy re-encryption / ID-based encryption / Homomorphic encryption / ElGamal encryption / Chosen-ciphertext attack / Encryption / RSA / Key / Symmetric-key algorithm / Identity-based conditional proxy re-encryption

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

DocID: 1xVxZ - View Document

Cryptography / Public-key cryptography / Key management / Public key infrastructure / Proxy re-encryption / Identity-based cryptography / Encryption / Symmetric-key algorithm / Key generation / Integrated Encryption Scheme / Hybrid cryptosystem / Cipher

NuCypher: A proxy re-encryption network to empower privacy in decentralized systems Michael Egorov,∗ David Nuñez,† and MacLane Wilkison‡ NuCypher (Dated: June 19, 2018) NuCypher is a decentralized Key Management S

DocID: 1xUUF - View Document

Combined Proxy Re-Encryption Orange Labs, Applied Crypto Group, Université de Caen Basse-Normandie, GREYC, Sébastien Canard et Julien Devigne Journées C2 2012, Dinard

DocID: 1uOrl - View Document

Proxy Re-Encryption Advisor(s): Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

DocID: 1rYWY - View Document

Cryptography / Public-key cryptography / Attribute-based encryption / Encryption / ID-based encryption / Personal health record / RSA / Key / Cipher / Data Encryption Standard / Cloud computing security / Identity-based conditional proxy re-encryption

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1qQ53 - View Document