The following pages link to (Q4737236):
Displayed 32 items.
- Self-updatable encryption with short public parameters and its extensions (Q264135) (← links)
- \texttt{FlipIt}: the game of ``stealthy takeover'' (Q380966) (← links)
- Certificateless strong key-insulated signature without random oracles (Q407492) (← links)
- One forward-secure signature scheme using bilinear maps and its applications (Q506297) (← links)
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency (Q511917) (← links)
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model (Q514535) (← links)
- Strong key-insulated signature in the standard model (Q615357) (← links)
- Certificateless key-insulated signature without random oracles (Q621463) (← links)
- Attribute-based key-insulated signature and its applications (Q726546) (← links)
- Verifiable random functions: relations to identity-based key encapsulation and new constructions (Q744351) (← links)
- Key-insulated aggregate signature (Q1633053) (← links)
- Anonymous IBE, leakage resilience and circular security from new assumptions (Q1648813) (← links)
- IRIBE: intrusion-resilient identity-based encryption (Q1750529) (← links)
- Revocable hierarchical identity-based encryption (Q2015131) (← links)
- Optimal bounded-collusion secure functional encryption (Q2175911) (← links)
- Bandwidth-efficient attribute-based key-insulated signatures with message recovery (Q2282075) (← links)
- Identity-based encryption with hierarchical key-insulation in the standard model (Q2414931) (← links)
- An efficient threshold key-insulated signature scheme (Q2440174) (← links)
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold (Q2502164) (← links)
- An improved certificateless strong key-insulated signature scheme in the standard model (Q2516787) (← links)
- Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More (Q2890012) (← links)
- Leakage Resilient Strong Key-Insulated Signatures in Public Channel (Q3103599) (← links)
- Constructions of CCA-Secure Revocable Identity-Based Encryption (Q3194596) (← links)
- Generic Construction of Bounded-Collusion IBE via Table-Based ID-to-Key Map (Q3297639) (← links)
- An Efficient Strong Key-Insulated Signature Scheme and Its Application (Q3506354) (← links)
- Key Insulation and Intrusion Resilience over a Public Channel (Q3623037) (← links)
- Revocable Identity-Based Encryption Revisited: Security Model and Construction (Q4916011) (← links)
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles (Q5458941) (← links)
- Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk) (Q5502804) (← links)
- Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps (Q5505460) (← links)
- Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions (Q5738752) (← links)
- Scalable public-key tracing and revoking (Q5917935) (← links)