Back to Results
First PageMeta Content
Electronic commerce / ID-based encryption / Chosen-ciphertext attack / Certificate-based encryption / Cipher / Boneh/Franklin scheme / Public key certificate / Certificate authority / RSA / Cryptography / Public-key cryptography / Key management


Document Date: 2003-09-02 18:40:07


Open Document

File Size: 251,78 KB

Share Result on Facebook

Company

G2 / Certificate Revocation Problem Craig Gentry DoCoMo USA Labs / G1 / Some Previous Solutions / Micali / /

/

IndustryTerm

online computation / generation algorithm / setup algorithm / little online overhead / hash-based systems / query processing costs / Online Certificate Status Protocol / cyclic / deterministic decryption algorithm / probabilistic encryption algorithm / deterministic certifier update algorithm / latency applications / public-key infrastructure / certificate server / deterministic client update algorithm / a lot of infrastructure / certificate management / /

OperatingSystem

DoS / /

Person

Key Generator / /

Product

BLS / Franklin / /

ProvinceOrState

California / /

Technology

Encryption / strongly key-insulated encryption / 1.3 Identity-Based Encryption / cryptography / main algorithms / how certificate-based encryption / randomized algorithm / probabilistic PKE key generation algorithm / public key / deterministic decryption algorithm / 2 Certificate-Based Encryption / public-key encryption / PKI / probabilistic encryption algorithm / setup algorithm / identity-based encryption / probabilistic IBE key generation algorithm / deterministic client update algorithm / known algorithm / Private key / secret key / certificate-based encryption / deterministic certifier update algorithm / public-key infrastructure / public key encryption / /

SocialTag