ID-based encryption

Results: 182



#Item
71Advantage / Semantic security / XTR / Cyberwarfare / Security / Applied mathematics / Cryptography / ID-based encryption / Ciphertext indistinguishability

1 Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack Peng Xu and Hai Jin, Senior Member, IEEE

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-08-22 03:22:56
72ElGamal encryption / RSA / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / ID-based encryption / Cipher / Ciphertext indistinguishability / Ciphertext stealing / Cryptography / Public-key cryptography / Proxy re-encryption

Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings∗ Jian Weng1,2 , Robert H. Deng1 , Shengli Liu3 , Kefei Chen3 , Junzuo Lai3 , Xu An Wang4 1 School of Information Systems, Singapore Management University,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-05-04 02:53:48
73Key / Public-key cryptography / Ciphertext / Adaptive chosen-ciphertext attack / Diffie–Hellman key exchange / Certificateless cryptography / Cramer–Shoup cryptosystem / Cryptography / ID-based encryption / Chosen-ciphertext attack

On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhang@

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-23 04:27:14
74Semantic security / Cipher / RSA / Adaptive chosen-ciphertext attack / Boneh/Franklin scheme / Chosen-ciphertext attack / Key / Advantage / Cryptography / ID-based encryption / Public-key cryptography

Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application Yumiko Hanaoka∗, Goichiro Hanaoka†, Junji Shikata‡and Hideki Imai§ December 12, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-12 03:12:37
75ID-based encryption / Key size / Key / Symmetric-key algorithm / Encryption / RSA / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Cipher / Public-key cryptography

Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam Sashank Dara

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-16 09:55:41
76ID-based encryption / RSA / Optimal asymmetric encryption padding / ElGamal encryption / Paillier cryptosystem / Homomorphic encryption / Block cipher modes of operation / Ciphertext indistinguishability / Digital signature / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem

Noname manuscript No. (will be inserted by the editor) Charm: A Framework for Rapidly Prototyping Cryptosystems Joseph A. Akinyele · Christina Garman · Ian Miers · Matthew W. Pagano · Michael Rushanan · Matthew Gree

Add to Reading List

Source URL: hms.isi.jhu.edu

Language: English - Date: 2013-01-28 17:13:20
77Random oracle / Password / ID-based encryption / Key-agreement protocol / Advantage / Public-key cryptography / Semantic security / Password Authenticated Key Exchange by Juggling / Cryptography / Cryptographic protocols / Password-authenticated key agreement

ID-Based Group Password-Authenticated Key Exchange Xun Yi1 , Raylin Tso2 , and Eiji Okamoto2 1 School of Engineering and Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-04 01:09:45
78ID-based encryption / RSA / XTR / Gaussian elimination / Cryptography / Public-key cryptography / Electronic commerce

Breaking An Identity-Based Encryption Scheme based on DHIES Martin R. Albrecht1 and Kenneth G. Paterson2? 1 INRIA, Paris-Rocquencourt Center, SALSA Project UPMC Univ Paris 06, UMR 7606, LIP6, F-75005, Paris, France CNRS,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-08-30 13:51:52
79Certificate-based encryption / Advantage / Cipher / RSA / ID-based encryption / Chosen-ciphertext attack / Cryptography / Public-key cryptography / Electronic commerce

Microsoft Word - Certificate-Based Encryption Resilient to Key Leakage.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-06 23:12:57
80ID-based encryption / Cyberwarfare / Semantic security / Applied mathematics / Security / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Bilinear Pairings in Cryptography: Identity Based Encryption Dan Boneh Stanford University

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-05-27 15:07:17
UPDATE