Pages that link to "Item:Q5311549"
From MaRDI portal
The following pages link to Advances in Cryptology – CRYPTO 2004 (Q5311549):
Displayed 27 items.
- Programmable hash functions and their applications (Q434345) (← links)
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups (Q445344) (← links)
- An identity-based encryption scheme with compact ciphertexts (Q615206) (← links)
- Identity-based broadcast encryption with shorter transmissions (Q655096) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Secure public-key encryption scheme without random oracles (Q942322) (← links)
- Efficient Tate pairing computation using double-base chains (Q954437) (← links)
- Fully CCA2 secure identity based broadcast encryption without random oracles (Q987813) (← links)
- A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model (Q1009100) (← links)
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions (Q1021236) (← links)
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (Q1034629) (← links)
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold (Q2502164) (← links)
- Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More (Q2890012) (← links)
- Attribute-Based Signatures (Q3073718) (← links)
- Verifiable Security of Boneh-Franklin Identity-Based Encryption (Q3092349) (← links)
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts (Q3408210) (← links)
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks (Q3503870) (← links)
- Formal Security Treatments for Signatures from Identity-Based Encryption (Q3503884) (← links)
- An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model (Q3506348) (← links)
- Practical Identity-Based Encryption Without Random Oracles (Q3593111) (← links)
- Adaptive-ID Secure Revocable Identity-Based Encryption (Q3623031) (← links)
- Reducing elliptic curve logarithms to logarithms in a finite field (Q4307376) (← links)
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys (Q5387100) (← links)
- Proxy Re-signature Schemes Without Random Oracles (Q5458210) (← links)
- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power (Q5458217) (← links)
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles (Q5458941) (← links)
- Secure Hierarchical Identity Based Encryption Scheme in the Standard Model (Q5504615) (← links)