General Certificateless Encryption and Timed-Release Encryption
From MaRDI portal
Publication:3540040
DOI10.1007/978-3-540-85855-3_9zbMath1180.94050MaRDI QIDQ3540040
Sherman S. M. Chow, Volker Roth, Eleanor G. Rieffel
Publication date: 20 November 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-85855-3_9
94A60: Cryptography
68P25: Data encryption (aspects in computer science)
94A62: Authentication, digital signatures and secret sharing
Related Items
A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication, A more efficient accountable authority IBE scheme under the DL assumption, Timed-Release Encryption Revisited, Self-updatable encryption: time constrained access control with hidden attributes and better efficiency, Cryptanalysis of a certificateless signcryption scheme in the standard model, How to build time-lock encryption, Access control encryption from group encryption, Combiners for Chosen-Ciphertext Security, General Certificateless Encryption and Timed-Release Encryption
Cites Work
- Certificateless signature: a new security model and an improved generic construction
- A forward-secure public-key encryption scheme
- Identity-Based Cryptosystems and Signature Schemes
- Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability
- Token-Controlled Public Key Encryption in the Standard Model
- Improved Anonymous Timed-Release Encryption
- Timed-Release and Key-Insulated Public Key Encryption
- General Certificateless Encryption and Timed-Release Encryption
- Practical Identity-Based Encryption Without Random Oracles
- Conditional Oblivious Transfer and Timed-Release Encryption
- Hierarchical ID-Based Cryptography
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Information and Communications Security
- Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles)
- Certificateless Encryption Schemes Strongly Secure in the Standard Model
- Strongly Secure Certificateless Public Key Encryption Without Pairing
- Information Security
- Information Security
- Self-Generated-Certificate Public Key Encryption Without Pairing
- Public Key Cryptography - PKC 2006
- Advances in Cryptology - ASIACRYPT 2003