ID-based encryption

Results: 182



#Item
21Digital signature / ID-based encryption / RSA / Cryptography / Public-key cryptography / Ciphertext indistinguishability

An extended abstract of this paper is published in the proceedings of ASIACRYPTSignature Schemes Secure against Hard-to-Invert Leakage Sebastian Faust∗, Carmit Hazay†,

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-12-29 12:12:28
22

ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption Danfeng Yao∗ Nelly Fazio†

Add to Reading List

Source URL: cs.brown.edu

Language: English - Date: 2004-08-27 22:01:21
    23Malleability / ID-based encryption / Advantage / Chosen-plaintext attack / Cipher / Ciphertext indistinguishability / Semantic security / Cryptography / Chosen-ciphertext attack / RSA

    Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts∗ Duong-Hieu Phan 1,2,3 Siamak F. Shahandashti 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-07-23 20:29:45
    24Key / Probabilistic encryption / Symmetric-key algorithm / Message authentication code / Digital signature / ID-based encryption / Integrated Encryption Scheme / Cryptography / Key management / Public-key cryptography

    Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin Alina Oprea

    Add to Reading List

    Source URL: www.zurich.ibm.com

    Language: English - Date: 2005-09-02 12:11:39
    25ID-based encryption / RSA / Digital signature / Standard model / Encryption / Cryptography / Public-key cryptography / Signcryption

    Public-Key Cryptography with Joint and Related-Key Security Susan Thomson Thesis submitted to the University of London for the degree of Doctor of Philosophy

    Add to Reading List

    Source URL: www.isg.rhul.ac.uk

    Language: English - Date: 2014-10-10 11:06:02
    26Key management / Online chat / Man-in-the-middle attack / Public-key cryptography / Secure messaging / ID-based encryption / Secure communication / Email encryption / ZRTP / Cryptography / Cryptographic protocols / Internet privacy

    SoK: Secure Messaging1 Nik Unger∗ , Sergej Dechand† Joseph Bonneau‡§ , Sascha Fahl¶ , Henning Perl¶ Ian Goldberg∗ , Matthew Smith† ∗

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2015-04-11 10:28:11
    27Cryptographic protocols / Electronic commerce / X.509 / Transport Layer Security / ID-based cryptography / ID-based encryption / Public key infrastructure / Grid Security Infrastructure / Digital signature / Cryptography / Key management / Public-key cryptography

    Identity-Based Cryptography for Grid Security Hoon Wei Lim and Kenneth G. Paterson Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX, UK {h.lim, kenny.paterson}@rhul.ac.uk

    Add to Reading List

    Source URL: www.isg.rhul.ac.uk

    Language: English - Date: 2005-09-30 07:23:50
    28Mathematics / Elliptic curve cryptography / Elliptic curve / Boneh/Franklin scheme / ID-based encryption / Pairing / Homomorphic signatures for network coding / BLS / Cryptography / Abstract algebra / Algebra

    Verified Indifferentiable Hashing into Elliptic Curves Santiago Zanella B´eguelin1 Gilles Barthe2 , Benjamin Gr´egoire3 , Sylvain Heraud3 and Federico Olmedo2

    Add to Reading List

    Source URL: certicrypt.gforge.inria.fr

    Language: English - Date: 2013-06-17 13:32:36
    29ID-based cryptography / Cyberwarfare / Security / Key management / Boneh/Franklin scheme / Applied mathematics / Cryptography / ID-based encryption / Public-key cryptography

    Verifiable Security of Boneh-Franklin Identity-Based Encryption Federico Olmedo Gilles Barthe Santiago Zanella Béguelin IMDEA Software Institute, Madrid, Spain

    Add to Reading List

    Source URL: certicrypt.gforge.inria.fr

    Language: English - Date: 2013-06-17 13:32:36
    30Intel Core / Cryptography / Boneh/Franklin scheme / ID-based encryption

    Verifiable Security of Boneh-Franklin Identity-Based Encryption⋆ Gilles Barthe, Federico Olmedo, and Santiago Zanella B´eguelin {Gilles.Barthe,Federico.Olmedo,Santiago.Zanella}@imdea.org IMDEA Software Institute, Madr

    Add to Reading List

    Source URL: software.imdea.org

    Language: English - Date: 2013-03-13 12:33:24
    UPDATE