Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited
暂无分享,去创建一个
Kefei Chen | Xueli Wang | Guilin Wang | Wei Gao | Guilin Wang | Wei Gao | Xueli Wang | Kefei Chen
[1] Pil Joong Lee,et al. Identity-Based Cryptography in Public Key Management , 2004, EuroPKI.
[2] Sanjit Chatterjee,et al. Another Look at Tightness , 2011, IACR Cryptol. ePrint Arch..
[3] Limin Shen,et al. Efficient Revocable Certificateless Encryption Secure in the Standard Model , 2014, Comput. J..
[4] Li Xu,et al. A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption , 2012, Comput. J..
[5] Paz Morillo,et al. Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes , 2006, EuroPKI.
[6] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[7] Jean-Jacques Quisquater,et al. On Constructing Certificateless Cryptosystems from Identity Based Encryption , 2006, Public Key Cryptography.
[8] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[9] Sattam S. Al-Riyami. Cryptographic schemes based on elliptic curve pairings , 2004 .
[10] Pil Joong Lee,et al. Generic Construction of Certificateless Encryption , 2004, ICCSA.
[11] Je Hong Park,et al. Is it possible to have CBE from CL-PKE? , 2005, IACR Cryptol. ePrint Arch..
[12] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[13] Kenneth G. Paterson,et al. CBE from CL-PKE: A Generic Construction and Efficient Schemes , 2005, Public Key Cryptography.
[14] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[15] Alexander W. Dent,et al. A survey of certificateless encryption schemes and security models , 2008, International Journal of Information Security.
[16] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[17] Marc Girault,et al. Self-Certified Public Keys , 1991, EUROCRYPT.
[18] Limin Shen,et al. Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles , 2014, Secur. Commun. Networks.
[19] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.