On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
From MaRDI portal
Publication:735025
DOI10.1007/s10623-009-9278-yzbMath1174.94014OpenAlexW2169965215WikidataQ123003131 ScholiaQ123003131MaRDI QIDQ735025
Sriramkrishnan Srinivasan, Kenneth G. Paterson
Publication date: 14 October 2009
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-009-9278-y
Related Items (max. 100)
Signal-flow-based analysis of wireless security protocols ⋮ Identity-based non-interactive key distribution with forward security ⋮ Non-Interactive Key Exchange ⋮ Generic Construction of Stateful Identity Based Encryption ⋮ Identity-based authenticated encryption with identity confidentiality ⋮ Solving discrete logarithm problems faster with the aid of pre-computation ⋮ Comment on ``Identity-based non-interactive key distribution with forward security
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A non-interactive public-key distribution system
- Pairings for cryptographers
- Towards practical non-interactive public-key cryptosystems using non-maximal imaginary qua\-dratic orders
- Generic constructions of identity-based and certificateless kEMs
- Provably secure non-interactive key distribution based on pairings
- An elliptic curve trapdoor system
- Identity-Based Cryptosystems and Signature Schemes
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Key agreement protocols and their security analysis
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Applied Cryptography and Network Security
- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- Algorithmic Number Theory
- Topics in Cryptology – CT-RSA 2004
This page was built for publication: On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups