The following pages link to PBC Library (Q21808):
Displaying 31 items.
- Authenticated hash tables based on cryptographic accumulators (Q262258) (← links)
- Broadcast encryption based non-interactive key distribution in MANETs (Q389369) (← links)
- Simplified small exponent test for batch verification (Q501674) (← links)
- Anonymous spatial encryption under affine space delegation functionality with full security (Q506150) (← links)
- A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation (Q780319) (← links)
- Provably secure certificate-based encryption with leakage resilience (Q1698724) (← links)
- Expressive attribute-based keyword search with constant-size ciphertext (Q1800303) (← links)
- Research on ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storage (Q1992717) (← links)
- Blockchain-based two-party fair contract signing scheme (Q2023216) (← links)
- Fully secure ABE with outsourced decryption against chosen ciphertext attack (Q2057133) (← links)
- Efficient multi-client order-revealing encryption and its applications (Q2148746) (← links)
- Public key encryption with temporary and fuzzy keyword search (Q2160747) (← links)
- Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation (Q2194864) (← links)
- Anonymous HIBE with short ciphertexts: full security in prime order groups (Q2256104) (← links)
- A fully distributed hierarchical attribute-based encryption scheme (Q2310742) (← links)
- An alternative approach to public cloud data auditing supporting data dynamics (Q2318271) (← links)
- ABE with improved auxiliary input for big data security (Q2402348) (← links)
- Short signatures without random oracles and the SDH assumption in bilinear groups (Q2425530) (← links)
- Group signatures with controllable linkability for dynamic membership (Q2510508) (← links)
- Public-key authenticated encryption with keyword search revisited: security model and constructions (Q2660908) (← links)
- Public key based searchable encryption with fine-grained sender permission control (Q2697904) (← links)
- Verifiable functional encryption using Intel SGX (Q2697922) (← links)
- Identity-Based Batch Provable Data Possession (Q2953853) (← links)
- Efficient system parameters for Identity-Based Encryption using supersingular elliptic curves (Q3121344) (← links)
- SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption (Q3297518) (← links)
- Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem (Q3392897) (← links)
- Identity-Based Batch Provable Data Possession with Detailed Analyses (Q4605649) (← links)
- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies (Q4916023) (← links)
- A Pairing-Less Identity-Based Blind Signature with Message Recovery Scheme for Cloud-Assisted Services (Q5040413) (← links)
- Public key encryption with distributed keyword search (Q5059574) (← links)
- PandA: Pairings and Arithmetic (Q5746234) (← links)