Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
From MaRDI portal
Publication:5898591
DOI10.1007/11617983zbMATH Open1125.94029OpenAlexW4376524422MaRDI QIDQ5898591FDOQ5898591
Authors: Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai
Publication date: 12 February 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11617983
Recommendations
- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
- Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
- A modular analysis of the Fujisaki-Okamoto transformation
- Advances in Cryptology - EUROCRYPT 2004
- Public Key Cryptography - PKC 2006
Cited In (12)
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
- Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
- A modular analysis of the Fujisaki-Okamoto transformation
- On the anonymity of multi-receiver identity-based encryption based on Fujisaki-Okamoto transformation
- A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model
- Authenticated public key broadcast encryption scheme secure against insiders' attack
- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
- Attacks on Okamoto and Tanaka's one-way ID-based key distribution system
- Cryptography and Coding
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- Title not available (Why is that?)
- Receiver selective opening security for identity-based encryption in the multi-challenge setting
This page was built for publication: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5898591)