On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
From MaRDI portal
Publication:735025
DOI10.1007/S10623-009-9278-YzbMATH Open1174.94014OpenAlexW2169965215WikidataQ123003131 ScholiaQ123003131MaRDI QIDQ735025FDOQ735025
Authors: Kenneth G. Paterson, Sriramkrishnan Srinivasan
Publication date: 14 October 2009
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-009-9278-y
Recommendations
- Identity-based non-interactive key distribution with forward security
- A non-interactive public-key distribution system
- Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange scheme. Revisited
- Comment on ``Identity-based non-interactive key distribution with forward security
- Provably secure non-interactive key distribution based on pairings
Cites Work
- Generic constructions of identity-based and certificateless kEMs
- Identity-based cryptosystems and signature schemes
- Key agreement protocols and their security analysis
- Title not available (Why is that?)
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Title not available (Why is that?)
- Title not available (Why is that?)
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Pairings for cryptographers
- Title not available (Why is that?)
- Title not available (Why is that?)
- An elliptic curve trapdoor system
- Title not available (Why is that?)
- Provably secure non-interactive key distribution based on pairings
- Title not available (Why is that?)
- Title not available (Why is that?)
- Applied Cryptography and Network Security
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- A non-interactive public-key distribution system
- Topics in Cryptology – CT-RSA 2004
- Title not available (Why is that?)
- Title not available (Why is that?)
- Towards practical non-interactive public-key cryptosystems using non-maximal imaginary qua\-dratic orders
- Title not available (Why is that?)
- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
- Algorithmic Number Theory
Cited In (7)
- Solving discrete logarithm problems faster with the aid of pre-computation
- Identity-based non-interactive key distribution with forward security
- Comment on ``Identity-based non-interactive key distribution with forward security
- Non-interactive key exchange
- Generic Construction of Stateful Identity Based Encryption
- Identity-based authenticated encryption with identity confidentiality
- Signal-flow-based analysis of wireless security protocols
This page was built for publication: On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q735025)