scientific article; zbMATH DE number 2009961

From MaRDI portal
Revision as of 03:33, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4434881

zbMath1037.68533MaRDI QIDQ4434881

Craig Gentry

Publication date: 26 November 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560272.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (41)

Efficient Certificate-Based Signature and Its AggregationAn Efficient and Provably Secure Certificate-Based Encryption SchemePrivate Certificate-Based Remote Data Integrity Checking in Public CloudsCertificate-based signcryption with enhanced security featuresAccountable identity-based encryption with distributed private key generatorsEfficient revocable identity-based encryption via subset difference methodsAdaptively secure certificate-based broadcast encryption and its application to cloud storage serviceUnnamed ItemAn improved ring signature scheme without trusted key generation center for wireless sensor networkSecurity weakness of a certificate-based proxy signature scheme for IIoT environmentsTowards Certificate-Based Group EncryptionFully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile CommunicationsGeneric constructions of identity-based and certificateless kEMsAnonymous certificate-based broadcast encryption with constant decryption costCertificateless Public Key Signature Schemes from Standard AlgorithmsNotes on a provably-secure certificate-based encryption against malicious CA attacksProvably secure certificate-based encryption with leakage resilienceProvably secure certificate-based proxy blind signature scheme from pairingsIdentity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parametersReflections on the security proofs of Boneh-Franklin identity-based encryption scheme(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistanceProvably secure certificate-based signature scheme without pairingsCertificate-based verifiably encrypted signatures from pairingsEfficient Certificate-Based Encryption in the Standard ModelCertificate-Based Signature Schemes without Pairings or Random OraclesCryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environmentsCertificate-based proxy decryption systems with revocability in the standard modelRevocable Identity-Based Encryption Revisited: Security Model and ConstructionContinuous leakage-resilient certificate-based signcryption scheme and application in cloud computingContinuous leakage-resilient certificate-based encryptionCertificate-Based Signatures: New Definitions and a Generic Construction from Certificateless SignaturesA provably secure certificate-based encryption scheme against malicious CA attacks in the standard modelSymmetric threshold multipath (STM): an online symmetric key management schemeA Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption PowerCertificate-Based Generalized Ring Signcryption SchemeAsymmetric Group Key AgreementDistributed key generation for SM9-based systemsCertified Encryption RevisitedConjunctive Broadcast and Attribute-Based EncryptionUnnamed ItemAn efficient certificate-based signature scheme in the standard model







This page was built for publication: