Publication:4434881

From MaRDI portal


zbMath1037.68533MaRDI QIDQ4434881

Craig Gentry

Publication date: 26 November 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560272.htm


94A60: Cryptography

68P25: Data encryption (aspects in computer science)

94A62: Authentication, digital signatures and secret sharing


Related Items

Revocable Identity-Based Encryption Revisited: Security Model and Construction, Certificate-Based Generalized Ring Signcryption Scheme, A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power, Certificate-based signcryption with enhanced security features, Certificate-based proxy decryption systems with revocability in the standard model, An improved ring signature scheme without trusted key generation center for wireless sensor network, Symmetric threshold multipath (STM): an online symmetric key management scheme, Certificate-based verifiably encrypted signatures from pairings, Provably secure certificate-based encryption with leakage resilience, Continuous leakage-resilient certificate-based encryption, A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model, Efficient revocable identity-based encryption via subset difference methods, Generic constructions of identity-based and certificateless kEMs, Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme, Provably secure certificate-based signature scheme without pairings, An Efficient and Provably Secure Certificate-Based Encryption Scheme, Towards Certificate-Based Group Encryption, Private Certificate-Based Remote Data Integrity Checking in Public Clouds, Conjunctive Broadcast and Attribute-Based Encryption, Efficient Certificate-Based Encryption in the Standard Model, Certificate-Based Signature Schemes without Pairings or Random Oracles, Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures, Asymmetric Group Key Agreement, Certified Encryption Revisited