Implementation of Algorithms for Identity Based Encryption and Decryption
暂无分享,去创建一个
[1] Daniel R. Simon,et al. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.
[2] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[3] Moni Naor,et al. Nonmalleable Cryptography , 2000, SIAM Rev..
[4] Toshiya Itoh,et al. An ID-based cryptosystem based on the discrete logarithm problem , 1989, IEEE J. Sel. Areas Commun..
[5] Yan Gu,et al. A Performance Analysis of Identity-Based Encryption Schemes , 2011, INTRUST.
[6] Tatsuaki Okamoto,et al. On Pairing-Based Cryptosystems , 2006, VIETCRYPT.
[7] Hugo Krawczyk,et al. Public-key cryptography and password protocols , 1999 .
[8] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[9] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[10] Dong Hoon Lee,et al. Anonymous HIBE with short ciphertexts: full security in prime order groups , 2013, Designs, Codes and Cryptography.
[11] Ben Lynn,et al. Toward Hierarchical Identity-Based Encryption , 2002, EUROCRYPT.
[12] Ben Lynn,et al. Authenticated Identity-Based Encryption , 2002, IACR Cryptol. ePrint Arch..
[13] Ichiro Hasuo,et al. Security Notions for Identity Based Encryption , 2005, IACR Cryptol. ePrint Arch..
[14] Sriramkrishnan Srinivasan,et al. Identity based encryption: Progress and challenges , 2010, Inf. Secur. Tech. Rep..
[15] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[16] Fuchun Guo,et al. Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption , 2016, IEEE Trans. Inf. Forensics Secur..
[17] Brent Waters,et al. Identity-Based Encryption Secure against Selective Opening Attack , 2011, TCC.
[18] Ratna Dutta,et al. Pairing-Based Cryptographic Protocols : A Survey , 2004, IACR Cryptol. ePrint Arch..
[19] Eiji Okamoto,et al. Key distribution system based on identification information , 1989, IEEE J. Sel. Areas Commun..
[20] Brent Waters,et al. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..
[21] Chandrashekhar Meshram,et al. An ID-Based Public Key Cryptosystem based on Integer Factoring and Double Discrete Logarithm Problem , 2010 .
[22] Masao Kasahara,et al. ID based Cryptosystems with Pairing on Elliptic Curve , 2003, IACR Cryptol. ePrint Arch..
[23] David Pointcheval,et al. On the Security Notions for Public-Key Encryption Schemes , 2004, SCN.
[24] Fuchun Guo,et al. Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices , 2017, IEEE Transactions on Dependable and Secure Computing.
[25] Brent Waters,et al. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.