Back to Results
First PageMeta Content
Electronic commerce / Ciphertext indistinguishability / RSA / Semantic security / Cipher / ID-based cryptography / Key / Public key infrastructure / Symmetric-key algorithm / Cryptography / Public-key cryptography / Key management


Certificateless Public Key Cryptography Sattam S. Al-Riyami and Kenneth G. Paterson∗ Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX [removed]
Add to Reading List

Document Date: 2008-09-15 00:54:54


Open Document

File Size: 270,90 KB

Share Result on Facebook

Company

params SA / G1 / KGC / G2 / /

Currency

pence / /

/

Event

FDA Phase / Funding / Reorganization / /

Facility

University of London / /

IndustryTerm

secure systems / secure algorithms / polynomial-time algorithm / multiplicative / certificate management / additive / /

Organization

Certification Authority / NUF-NAL / Nuffield Foundation / University of London / /

Person

Sattam S. Al-Riyami / Kenneth G. Paterson / /

Position

security model for CL-PKE / This author / /

Product

Franklin / CL / M0 / /

ProvinceOrState

Pennsylvania / California / /

Technology

Public Key Infrastructure / randomized algorithm / identity-based public key encryption / PKI / Setup algorithm / private key / encryption / appropriately secure algorithms / Cryptography / 3 Certificateless Public Key Encryption / seven algorithms / An algorithm / PKI technology / Public Key / artificial intelligence / certificateless public key encryption / polynomial-time algorithm / seven randomized algorithms / /

SocialTag