On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
From MaRDI portal
(Redirected from Publication:735025)
Recommendations
- Identity-based non-interactive key distribution with forward security
- A non-interactive public-key distribution system
- Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange scheme. Revisited
- Comment on ``Identity-based non-interactive key distribution with forward security
- Provably secure non-interactive key distribution based on pairings
Cites work
- scientific article; zbMATH DE number 1722690 (Why is no real title available?)
- scientific article; zbMATH DE number 5009188 (Why is no real title available?)
- scientific article; zbMATH DE number 177614 (Why is no real title available?)
- scientific article; zbMATH DE number 1303149 (Why is no real title available?)
- scientific article; zbMATH DE number 503359 (Why is no real title available?)
- scientific article; zbMATH DE number 708800 (Why is no real title available?)
- scientific article; zbMATH DE number 1024018 (Why is no real title available?)
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- scientific article; zbMATH DE number 1775427 (Why is no real title available?)
- scientific article; zbMATH DE number 2086697 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- A non-interactive public-key distribution system
- Algorithmic Number Theory
- An Identity Based Encryption Scheme Based on Quadratic Residues
- An elliptic curve trapdoor system
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- Applied Cryptography and Network Security
- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
- Generic constructions of identity-based and certificateless kEMs
- Identity-based cryptosystems and signature schemes
- Key agreement protocols and their security analysis
- Pairings for cryptographers
- Provably secure non-interactive key distribution based on pairings
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Topics in Cryptology – CT-RSA 2004
- Towards practical non-interactive public-key cryptosystems using non-maximal imaginary qua\-dratic orders
Cited in
(7)- Solving discrete logarithm problems faster with the aid of pre-computation
- Identity-based non-interactive key distribution with forward security
- Comment on ``Identity-based non-interactive key distribution with forward security
- Non-interactive key exchange
- Identity-based authenticated encryption with identity confidentiality
- Generic Construction of Stateful Identity Based Encryption
- Signal-flow-based analysis of wireless security protocols
This page was built for publication: On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q735025)