A non-interactive public-key distribution system
From MaRDI portal
Recommendations
- Identity-based cryptosystems and signature schemes
- scientific article; zbMATH DE number 1024018
- An identity based threshold scheme
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
- Towards practical non-interactive public-key cryptosystems using non-maximal imaginary qua\-dratic orders
Cited in
(14)- Solving discrete logarithm problems faster with the aid of pre-computation
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
- An ID-based cryptographic mechanisms based on GDLP and IFP
- Efficient selective identity-based encryption without random oracles
- ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem
- An Identity-Based Key Agreement Protocol for the Network Layer
- A new key authentication scheme based on discrete logarithms
- Provably secure non-interactive key distribution based on pairings
- A subjective metric of authentication
- ID-based cryptography using symmetric primitives
- Reconfigurable cryptography: a flexible approach to long-term security
- scientific article; zbMATH DE number 1420968 (Why is no real title available?)
- A novel ID-based group signature
- On the Theoretical Gap between Group Signatures with and without Unlinkability
This page was built for publication: A non-interactive public-key distribution system
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q676923)