Topics in Cryptology – CT-RSA 2004
From MaRDI portal
Publication:5901685
DOI10.1007/b95630zbMath1196.94056OpenAlexW2500040996MaRDI QIDQ5901685
Kaoru Kurosawa, Swee-Huay Heng
Publication date: 7 May 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b95630
Related Items
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More, ID-based cryptography using symmetric primitives, Optimal bounded-collusion secure functional encryption, Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more, An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem, Compact Proofs of Retrievability, On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups, Verifiable random functions: relations to identity-based key encapsulation and new constructions, An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment