Boneh Franklin scheme

Results: 26



#Item
11Improvement of Ma ni ke ta l .

Improvement of Ma ni ke ta l .

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 05:56:33
12The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions Brent Waters† University of Texas at Austin

The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions Brent Waters† University of Texas at Austin

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-06 19:27:51
13Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application Yumiko Hanaoka∗, Goichiro Hanaoka†, Junji Shikata‡and Hideki Imai§ December 12, 2005  Abstract

Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application Yumiko Hanaoka∗, Goichiro Hanaoka†, Junji Shikata‡and Hideki Imai§ December 12, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-12 03:12:37
14An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

Add to Reading List

Source URL: www.ippari.unict.it

Language: English - Date: 2009-01-08 04:52:18
15Efficient Indifferentiable Hashing into Ordinary Elliptic Curves⋆ Eric Brier1 , Jean-S´ebastien Coron2 , Thomas Icart2⋆⋆ , David Madore3 , Hugues Randriam3 , and Mehdi Tibouchi2,4⋆ ⋆ ⋆ 1  Ingenico

Efficient Indifferentiable Hashing into Ordinary Elliptic Curves⋆ Eric Brier1 , Jean-S´ebastien Coron2 , Thomas Icart2⋆⋆ , David Madore3 , Hugues Randriam3 , and Mehdi Tibouchi2,4⋆ ⋆ ⋆ 1 Ingenico

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-06-03 09:18:30
16An Introduction to Pairing-Based Cryptography Alfred Menezes Abstract. Bilinear pairings have been used to design ingenious protocols for such tasks as one-round three-party key agreement, identity-based encryption, and

An Introduction to Pairing-Based Cryptography Alfred Menezes Abstract. Bilinear pairings have been used to design ingenious protocols for such tasks as one-round three-party key agreement, identity-based encryption, and

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-10-27 06:53:30
17Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions∗ Yang Cui1 , Eiichiro Fujisaki2 , Goichiro Hanaoka1 , Hideki Imai1,3 and Rui Zhang1 1  National Institute of Advanced Ind

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions∗ Yang Cui1 , Eiichiro Fujisaki2 , Goichiro Hanaoka1 , Hideki Imai1,3 and Rui Zhang1 1 National Institute of Advanced Ind

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-10 22:37:01
18FAULT ATTACKS ON PAIRING-BASED PROTOCOLS REVISITED SANJIT CHATTERJEE, KORAY KARABINA, AND ALFRED MENEZES Abstract. Several papers have studied fault attacks on computing a pairing value e(P, Q), where P is a public point

FAULT ATTACKS ON PAIRING-BASED PROTOCOLS REVISITED SANJIT CHATTERJEE, KORAY KARABINA, AND ALFRED MENEZES Abstract. Several papers have studied fault attacks on computing a pairing value e(P, Q), where P is a public point

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-06-20 19:35:34
19Identity Based Encryption  Terence Spies VP Engineering [removed]

Identity Based Encryption Terence Spies VP Engineering [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
20Identity-Based Encryption with Conventional Public-Key Cryptography

Identity-Based Encryption with Conventional Public-Key Cryptography

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-02-23 11:34:53