Identity-based cryptography
Results: 85
# | Item |
---|---|
81 | Efficient Identity-Based Encryption Without Random Oracles Brent WatersAdd to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-12-11 13:45:26 |
82 | Attribute-Based Encryption: Using Identity-Based Encryption for Access ControlAdd to Reading ListSource URL: www.emc.comLanguage: English |
83 | Strongly-Secure Identity-based Key Agreement and Anonymous Extension Sherman S.M. Chow1 and Kim-Kwang Raymond Choo2,Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2008-01-03 02:55:34 |
84 | An Identity Based Encryption Scheme based on Quadratic Residues Clifford CocksAdd to Reading ListSource URL: www.ime.usp.brLanguage: English - Date: 2004-02-20 08:26:44 |
85 | Identity-based Chameleon Hash and Applications Giuseppe Ateniese Breno de MedeirosAdd to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2004-03-15 18:18:40 |