Back to Results
First PageMeta Content
Public-key cryptography / Cocks IBE scheme / Ciphertext indistinguishability / XTR / Diffie–Hellman key exchange / Random oracle / Cipher / Boneh/Franklin scheme / Feistel cipher / Cryptography / ID-based encryption / Advantage


On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi
Add to Reading List

Document Date: 2009-10-12 12:17:42


Open Document

File Size: 278,12 KB

Share Result on Facebook

Company

Relations Between ID-NIKD / IBE / IBC / Dupont / ID-NIKD / Sriramkrishnan Srinivasan Information Security Group / TDL Groups / GT / /

Currency

USD / /

/

Event

Company Expansion / /

Facility

University of London / /

IndustryTerm

pair algorithms / sensor networks / cyclic / polynomial time algorithm / decryption algorithms / tamper-resistant hardware / interactive key distribution protocols / polynomial-time algorithm / additive / candidate solution / mobile ad hoc networks / encryption applications / distinct algorithms / /

MarketIndex

TA / /

MusicAlbum

U.K. / /

Organization

Bob / Alice / Trusted Authority / University of London / /

Person

Kenneth G. Paterson / /

Position

security model for ID-NIKD and that / random oracle model / i.e / IND-ID-CPA / /

Product

Franklin / /

ProvinceOrState

Saskatchewan / /

Technology

Encryption / cryptography / public key / interactive key distribution protocols / polynomial time algorithm / component algorithms / polynomial-time algorithm / identity-based encryption / three distinct algorithms / private key / secret key / DLP / simulation / pair algorithms / TDLGen algorithm / decryption algorithms / Extract algorithm / /

SocialTag