Shorter identity-based encryption via asymmetric pairings (Q404944): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
Normalize DOI.
 
(7 intermediate revisions by 7 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s10623-013-9834-3 / rank
Normal rank
 
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 94A60 / rank
 
Normal rank
Property / zbMATH DE Number
 
Property / zbMATH DE Number: 6340013 / rank
 
Normal rank
Property / zbMATH Keywords
 
public key cryptography
Property / zbMATH Keywords: public key cryptography / rank
 
Normal rank
Property / zbMATH Keywords
 
identity-based encryption
Property / zbMATH Keywords: identity-based encryption / rank
 
Normal rank
Property / zbMATH Keywords
 
functional encryption
Property / zbMATH Keywords: functional encryption / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s10623-013-9834-3 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1999078045 / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q123027269 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Lattice (H)IBE in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pairing-Friendly Elliptic Curves of Prime Order / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption from the Weil Pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short signatures from the Weil pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption: Definitions and Challenges / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elliptic curves suitable for pairing based cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434880 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bonsai Trees, or How to Delegate a Lattice Basis / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Identity Based Encryption Scheme Based on Quadratic Residues / rank
 
Normal rank
Property / cites work
 
Property / cites work: Anonymity from Asymmetry: New Constructions for Anonymous HIBE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: A taxonomy of pairing-friendly elliptic curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Easy Decision Diffie-Hellman Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for hard lattices and new cryptographic constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Non-interactive Proof Systems for Bilinear Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2763028 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic Encryption and Signatures from Vector Decomposition / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hierarchical Predicate Encryption for Inner-Products / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Variants of Waters’ Dual System Primitives Using Asymmetric Pairings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Cryptosystems and Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Evidence that XTR is more secure than supersingular elliptic curve cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S10623-013-9834-3 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 16:35, 9 December 2024

scientific article
Language Label Description Also known as
English
Shorter identity-based encryption via asymmetric pairings
scientific article

    Statements

    Shorter identity-based encryption via asymmetric pairings (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    4 September 2014
    0 references
    public key cryptography
    0 references
    identity-based encryption
    0 references
    functional encryption
    0 references
    0 references
    0 references

    Identifiers