Identity-based cryptography

Results: 85



#Item
1

Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography Aniket Kate Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2010-07-23 17:06:12
    2Cryptography / Public-key cryptography / Identity-based cryptography / Elliptic curve cryptography / Dan Boneh / ID-based encryption / Association for Computing Machinery / Pairing-based cryptography / Boneh / Infosys / ID-based cryptography / Computer science

    EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

    Add to Reading List

    Source URL: fellows.acm.org

    Language: English - Date: 2015-03-30 17:41:07
    3Cryptography / Public-key cryptography / Zero-knowledge proof / ID-based encryption / Cryptographic protocol / ID-based cryptography / Authentication / Digital signature / FeigeFiatShamir identification scheme

    Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

    Add to Reading List

    Source URL: security-lab.jaist.ac.jp

    Language: English - Date: 2015-11-23 04:37:54
    4Cryptography / Public-key cryptography / Attribute-based encryption / Encryption / ID-based encryption / Personal health record / RSA / Key / Cipher / Data Encryption Standard / Cloud computing security / Identity-based conditional proxy re-encryption

    ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    Add to Reading List

    Source URL: www.ijmetmr.com

    Language: English - Date: 2015-07-06 14:15:02
    5Cryptography / Computer security / Computer access control / Identity management / Public-key cryptography / Federated identity / Cryptographic protocols / Digital credential / Authentication / Credential / Multi-factor authentication / Access control

    Concepts and Languages for Privacy-Preserving Attribute-Based AuthenticationI,II Jan Camenischa,∗, Maria Dubovitskayaa,b , Robert R. Enderleina,b,∗∗, Anja Lehmanna , Gregory Nevena , Christian Paquinc , Franz-Stefa

    Add to Reading List

    Source URL: www.e7n.ch

    Language: English
    6Cryptography / Public-key cryptography / Identity-based cryptography / Attribute-based encryption / Cloud computing security / Encryption / ID-based encryption / Cipher / Identity-based conditional proxy re-encryption / Encrypting File System

    ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    Add to Reading List

    Source URL: www.ijmetmr.com

    Language: English - Date: 2015-06-03 03:06:48
    7Security / Identity management / Crime prevention / Cryptography / Information governance / National security / Prevention / Privacy / Internet privacy / Computer security

    GMOC and GENI Security Architecture – Joint Effort  The  team   currently  plans to implement  attribute­based credential  mechanisms  to enforce   the  policies for sharing operational data w

    Add to Reading List

    Source URL: groups.geni.net

    Language: English - Date: 2009-07-15 10:58:06
    8Cryptography / Public-key cryptography / Algebra / Pairing-based cryptography / Elliptic curve cryptography / Elliptic curves / Linear algebra / Identity-based cryptography / Tate pairing / Weil pairing / Pairing / ID-based encryption

    A Survey on Craptological Pairing Algorithms PauloS.//// LMBarreto Anonymized for submission

    Add to Reading List

    Source URL: www.anagram.com

    Language: English - Date: 2010-11-11 14:43:35
    9Computer access control / Key management / Access control / Public-key cryptography / Identity management / Simple public-key infrastructure / Authorization certificate / Authentication / Public key infrastructure / Delegation / PERMIS / Authorization

    Delegation Logic: A Logic-based Approach to Distributed Authorization NINGHUI LI Stanford University BENJAMIN N. GROSOF Massachusetts Institute of Technology

    Add to Reading List

    Source URL: cs-www.cs.yale.edu

    Language: English - Date: 2002-12-29 15:33:54
    10Public-key cryptography / Cryptography / Encryption / Ciphertext indistinguishability / Attribute-based encryption / ID-based encryption / RSA / Cipher / Data Encryption Standard / Identity-based conditional proxy re-encryption / Semantic security

    2015 IEEE Symposium on Security and Privacy Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2015-05-11 16:43:14
    UPDATE