Identity-based cryptography

Results: 85



#Item
81ID-based encryption / Forcing / Semantic security / Diffie–Hellman problem / Cryptography / Boneh/Franklin scheme / Advantage

Efficient Identity-Based Encryption Without Random Oracles Brent Waters

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-11 13:45:26
82Key management / Authorization certificate / ID-based encryption / Public key certificate / X.509 / Attribute grammar / RSA / Certificate authority / Ciphertext / Cryptography / Public-key cryptography / Electronic commerce

Attribute-Based Encryption: Using Identity-Based Encryption for Access Control

Add to Reading List

Source URL: www.emc.com

Language: English
83Key-agreement protocol / MQV / Public-key cryptography / XTR / Computational Diffie–Hellman assumption / Advantage / Perfect forward secrecy / Diffie–Hellman problem / Ciphertext indistinguishability / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

Strongly-Secure Identity-based Key Agreement and Anonymous Extension Sherman S.M. Chow1 and Kim-Kwang Raymond Choo2,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-01-03 02:55:34
84Modular arithmetic / Public-key cryptography / Quadratic residue / Electronic commerce / Integer sequences / RSA / XTR / Quadratic residuosity problem / Prime number / Cryptography / Mathematics / Number theory

An Identity Based Encryption Scheme based on Quadratic Residues Clifford Cocks

Add to Reading List

Source URL: www.ime.usp.br

Language: English - Date: 2004-02-20 08:26:44
85Hash function / SHA-1 / Lamport signature / ElGamal signature scheme / Cryptography / Digital signature / Cryptographic hash function

Identity-based Chameleon Hash and Applications Giuseppe Ateniese Breno de Medeiros

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-03-15 18:18:40
UPDATE