Identity-based cryptography

Results: 85



#Item
11Public-key cryptography / Access control / Message-oriented middleware / Identity management / Distributed computing architecture / Publishsubscribe pattern / ID-based encryption / Authentication / Encryption / Cryptographic protocol / Extensible Authentication Protocol / PubSubHubbub

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:14:55
12Cryptography / Public-key cryptography / Identity-based cryptography / ID-based cryptography / ID-1 / ID-based encryption / ID1 / Functional encryption / PKE / Key

Instantiating the Dual System Encryption Methodology in Bilinear Groups Allison Lewko joint work with Brent Waters Motivation

Add to Reading List

Source URL: ecc2011.loria.fr

Language: English - Date: 2011-09-30 12:40:03
13

In C.-M. Cheng et al., Eds., Public Key Cryptography − PKC 2016, Part I, volof Lecture Notes in Computer Science, pp, Springer, 2016. Identity-Based Cryptosystems and Quadratic Residuosity Marc Joye

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2016-02-23 20:14:59
    14Cryptography / Encryption / ElGamal encryption / Mix network / Ciphertext / Public-key cryptography / RSA / Cipher / Identity-based conditional proxy re-encryption / Proxy re-encryption

    Breaking Four Mix-related Schemes Based on Universal Re-encryption George Danezis K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium.

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2013-10-10 06:49:00
    15Security / Cryptography / Prevention / Identity management / Public-key cryptography / Computer networking / Content centric networking / Access control / IBAC / Encryption

    Interest-Based Access Control in CCN Cesar Ghali, Marc A. Schlosberg, Gene Tsudik, Christopher A. Wood Department of Computer Science University of California Irvine

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-03 12:09:18
    16Cryptography / Public-key cryptography / Elliptic curve cryptography / Computer networking / Named data networking / Key management / Digital signature / RSA / Elliptic Curve Digital Signature Algorithm / Secure Shell / Type-length-value / Digital Signature Algorithm

    Moderator-controlled Information Sharing by Identity-based Aggregate Signatures for Information Centric Networking Tohru Asami The University of Tokyo

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:18:49
    17

    Identity-based Cryptography for Securing Mobile Phone Calls ¨ Agel, Bernd Freisleben Matthew Smith, Christian Schridde, Bjorn Department of Mathematics and Computer Science, University of Marburg Hans-Meerwein-Str. 3, D

    Add to Reading List

    Source URL: www.dcsec.uni-hannover.de

    Language: English - Date: 2010-11-03 12:17:51
      18Cryptography / Identity-based cryptography / Public-key cryptography / Elliptic curve cryptography / Pairing-based cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / ID-based encryption / Advantage / Encryption / BonehFranklin scheme / Ciphertext

      Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands.

      Add to Reading List

      Source URL: www.dgalindo.es

      Language: English - Date: 2007-11-26 10:35:37
      19

      Securing Mobile Phone Calls with Identity-Based Cryptography ¨ Agel, Bernd Freisleben Matthew Smith, Christian Schridde, Bjorn Department of Mathematics and Computer Science, University of Marburg Hans-Meerwein-Str. 3,

      Add to Reading List

      Source URL: www.dcsec.uni-hannover.de

      Language: English - Date: 2010-11-03 12:17:51
        20Cryptography / Public-key cryptography / Identity-based cryptography / Chosen-ciphertext attack / Authenticated encryption / ID-based encryption / Encryption / RSA / Cipher / Ciphertext indistinguishability / Chosen-plaintext attack / Semantic security

        Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

        Add to Reading List

        Source URL: www-users.cs.umn.edu

        Language: English - Date: 2009-03-17 15:01:03
        UPDATE