Cryptography and Coding
From MaRDI portal
Publication:5897537
DOI10.1007/11586821zbMath1122.94032OpenAlexW2619930404MaRDI QIDQ5897537
Publication date: 1 November 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11586821
Related Items (14)
An efficient IBE scheme with tight security reduction in the random oracle model ⋮ Another Look at Tightness ⋮ An Efficient and Provably Secure Certificate-Based Encryption Scheme ⋮ Generic constructions of identity-based and certificateless kEMs ⋮ Inner-product encryption under standard assumptions ⋮ Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme ⋮ Efficient selective identity-based encryption without random oracles ⋮ Generic Construction of Bounded-Collusion IBE via Table-Based ID-to-Key Map ⋮ Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model ⋮ New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem ⋮ A new framework for the design and analysis of identity-based identification schemes ⋮ On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited ⋮ Continuous leakage-resilient certificate-based encryption ⋮ A new certificateless public key encryption scheme
This page was built for publication: Cryptography and Coding