Cryptography and Coding
From MaRDI portal
Publication:5897537
DOI10.1007/11586821zbMATH Open1122.94032OpenAlexW2619930404MaRDI QIDQ5897537FDOQ5897537
Publication date: 1 November 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11586821
Recommendations
- Information Security and Cryptology
- Verifiable security of Boneh-Franklin identity-based encryption
- Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
- A Framework for Identity-Based Encryption with Almost Tight Security
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- Identity-based Encryption from the Diffie-Hellman Assumption
- Identity-based encryption from the Diffie-Hellman assumption
- Advances in Cryptology - EUROCRYPT 2004
- Security proofs for identity-based identification and signature schemes
- Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange scheme. Revisited
Cited In (15)
- On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited
- Continuous leakage-resilient certificate-based encryption
- An efficient IBE scheme with tight security reduction in the random oracle model
- Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
- A new framework for the design and analysis of identity-based identification schemes
- Efficient selective identity-based encryption without random oracles
- An Efficient and Provably Secure Certificate-Based Encryption Scheme
- Generic Construction of Bounded-Collusion IBE via Table-Based ID-to-Key Map
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
- Inner-product encryption under standard assumptions
- Generic constructions of identity-based and certificateless kEMs
- ID-based public key cryptographic systems
- A new certificateless public key encryption scheme
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
- Another Look at Tightness
This page was built for publication: Cryptography and Coding
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5897537)