Cryptography and Coding
From MaRDI portal
Publication:5897537
DOI10.1007/11586821zbMath1122.94032OpenAlexW2619930404MaRDI QIDQ5897537
Publication date: 1 November 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11586821
Related Items
An efficient IBE scheme with tight security reduction in the random oracle model, Another Look at Tightness, An Efficient and Provably Secure Certificate-Based Encryption Scheme, Generic constructions of identity-based and certificateless kEMs, Inner-product encryption under standard assumptions, Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme, Efficient selective identity-based encryption without random oracles, Generic Construction of Bounded-Collusion IBE via Table-Based ID-to-Key Map, Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model, New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem, A new framework for the design and analysis of identity-based identification schemes, On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited, Continuous leakage-resilient certificate-based encryption, A new certificateless public key encryption scheme