Identity-based cryptography

Results: 85



#Item
41Semantic security / Cipher / RSA / Adaptive chosen-ciphertext attack / Boneh/Franklin scheme / Chosen-ciphertext attack / Key / Advantage / Cryptography / ID-based encryption / Public-key cryptography

Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application Yumiko Hanaoka∗, Goichiro Hanaoka†, Junji Shikata‡and Hideki Imai§ December 12, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-12 03:12:37
42Digital signature / Group signature / Proof of knowledge / Designated verifier signature / Zero-knowledge proof / RSA / Ring signature / IP / NP / Cryptography / Public-key cryptography / Cryptographic protocols

Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures∗ Siamak F Shahandashti  

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-05 21:04:21
43ID-based encryption / RSA / XTR / Gaussian elimination / Cryptography / Public-key cryptography / Electronic commerce

Breaking An Identity-Based Encryption Scheme based on DHIES Martin R. Albrecht1 and Kenneth G. Paterson2? 1 INRIA, Paris-Rocquencourt Center, SALSA Project UPMC Univ Paris 06, UMR 7606, LIP6, F-75005, Paris, France CNRS,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-08-30 13:51:52
44System software / Security Assertion Markup Language / Security / Keystore / Public key certificate / Service provider / SAML 2.0 / SAML-based products and services / Public-key cryptography / Identity management / Computer security

SSO Plugin Case study: Integrating with Ping Federate J System Solutions http://www.javasystemsolutions.com Version 4.0

Add to Reading List

Source URL: www.javasystemsolutions.com

Language: English - Date: 2014-01-20 14:08:32
45System software / Security Assertion Markup Language / Security / Keystore / Public key certificate / Service provider / SAML 2.0 / SAML-based products and services / Public-key cryptography / Identity management / Computer security

SSO Plugin Case study: Integrating with Ping Federate J System Solutions http://www.javasystemsolutions.com Version 4.0

Add to Reading List

Source URL: www.javasystemsolutions.com

Language: English - Date: 2014-01-20 14:08:32
46ID-based encryption / Cyberwarfare / Semantic security / Applied mathematics / Security / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Bilinear Pairings in Cryptography: Identity Based Encryption Dan Boneh Stanford University

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-05-27 15:07:17
47Advantage / Chosen-ciphertext attack / Public-key cryptography / Cipher / Chosen-plaintext attack / Encryption / Semantic security / Cryptography / Ciphertext indistinguishability / ID-based encryption

Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack Junzuo Lai⋆ , Robert H. Deng⋆⋆ , Shengli Liu⋆ ⋆ ⋆ , Jian Weng† , and Yunlei Zhao‡ Abstract. Security against selective o

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-29 21:25:11
48Cryptography / UICC configuration / UICC / Subscriber identity module / GlobalPlatform / Smart card application protocol data unit / Java Card / European Telecommunications Standards Institute / Smart card / Smart cards / Security / Espionage

TS[removed]V12[removed]Smart Cards; Remote APDU structure for UICC based applications (Release 12)

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-02-19 09:07:40
49Mihir Bellare / Cryptography / Trapdoor function / Injective function

LOSSY Identity-based (Lossy) Trapdoor Functions and Applications Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-21 02:35:56
50Cryptographic protocols / Electronic commerce / ID-based encryption / Transport Layer Security / Certificate authority / Cipher / Key / Public key certificate / Certificate server / Cryptography / Public-key cryptography / Key management

Using Identity-Based Encryption to Eliminate Certificates in SSL Transactions

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-07-18 00:26:34
UPDATE