<--- Back to Details
First PageDocument Content
ID-based cryptography / Cyberwarfare / Security / Key management / Boneh/Franklin scheme / Applied mathematics / Cryptography / ID-based encryption / Public-key cryptography
Date: 2013-06-17 13:32:36
ID-based cryptography
Cyberwarfare
Security
Key management
Boneh/Franklin scheme
Applied mathematics
Cryptography
ID-based encryption
Public-key cryptography

Verifiable Security of Boneh-Franklin Identity-Based Encryption Federico Olmedo Gilles Barthe Santiago Zanella Béguelin IMDEA Software Institute, Madrid, Spain

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Download Document from Source Website

File Size: 792,36 KB

Share Document on Facebook

Similar Documents

EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

DocID: 1rn34 - View Document

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

DocID: 1qZ4T - View Document

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1qQ53 - View Document

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1qey3 - View Document

2015 IEEE Symposium on Security and Privacy  SoK: Secure Messaging1 ∗  Nik Unger∗ , Sergej Dechand†

2015 IEEE Symposium on Security and Privacy SoK: Secure Messaging1 ∗ Nik Unger∗ , Sergej Dechand†

DocID: 1q7RY - View Document