Back to Results
First PageMeta Content
Applied mathematics / Security / ID-based encryption / RSA / ElGamal encryption / Cipher / Advantage / Cryptography / Public-key cryptography / Cyberwarfare


CBE from CL-PKE: A Generic Construction and Efficient Schemes Sattam S. Al-Riyami and Kenneth G. Paterson Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX,
Add to Reading List

Document Date: 2004-11-08 04:27:00


Open Document

File Size: 231,38 KB

Share Result on Facebook

City

Certτ / DecCertτ / /

Company

params SA / G1 / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

University of London / /

IndustryTerm

real-world applications / bounded algorithm / probabilistic algorithm / additive / deterministic algorithm / deterministic certification algorithm / encryption algorithm / deterministic certificate consolidation algorithm / multiplicative / explicit key generation algorithms / /

Organization

Certification Authority / University of London / /

Person

S. Al-Riyami / Kenneth G. Paterson / /

Position

definition and security model for CBE / security model for CBE / /

Product

M0 / /

ProvinceOrState

Saskatchewan / Pennsylvania / /

RadioStation

CBE / /

Technology

Encryption / cryptography / randomized algorithm / seven algorithms / Public Key / valid encryption / artificial intelligence / six algorithms / certificateless public key encryption / deterministic certification algorithm / encryption algorithm / PKI / Scheme The algorithms / Setup algorithm / deterministic algorithm / identity-based encryption / subsequent encryptions / deterministic certificate consolidation algorithm / instead five algorithms / private key / certificate-based encryption / Consolidate algorithms / no polynomially bounded algorithm / explicit key generation algorithms / 4 Certificate-Based Encryption / probabilistic algorithm / 2 Certificateless Public Key Encryption / public key encryption / /

SocialTag