Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
From MaRDI portal
Publication:5898591
Recommendations
- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
- Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
- A modular analysis of the Fujisaki-Okamoto transformation
- Advances in Cryptology - EUROCRYPT 2004
- Public Key Cryptography - PKC 2006
Cited in
(12)- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
- Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
- A modular analysis of the Fujisaki-Okamoto transformation
- On the anonymity of multi-receiver identity-based encryption based on Fujisaki-Okamoto transformation
- A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model
- Authenticated public key broadcast encryption scheme secure against insiders' attack
- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
- Attacks on Okamoto and Tanaka's one-way ID-based key distribution system
- Cryptography and Coding
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- scientific article; zbMATH DE number 6672298 (Why is no real title available?)
- Receiver selective opening security for identity-based encryption in the multi-challenge setting
This page was built for publication: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5898591)