Generalized Key Delegation for Hierarchical Identity-Based Encryption
暂无分享,去创建一个
[1] Ben Lynn,et al. Toward Hierarchical Identity-Based Encryption , 2002, EUROCRYPT.
[2] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[3] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[4] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[5] Ahmed Obied,et al. Broadcast Encryption , 2008, Encyclopedia of Multimedia.
[6] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[7] Mihir Bellare,et al. Transitive signatures: new schemes and proofs , 2005, IEEE Transactions on Information Theory.
[8] A. Shamm. Identity-based cryptosystems and signature schemes , 1985 .
[9] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[10] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[11] Yevgeniy Dodis,et al. Public Key Broadcast Encryption for Stateless Receivers , 2002, Digital Rights Management Workshop.
[12] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[13] Hovav Shacham. The BBG HIBE Has Limited Delegation , 2007, IACR Cryptol. ePrint Arch..
[14] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[15] Sanjit Chatterjee,et al. Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext , 2006, INDOCRYPT.
[16] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[17] Nigel P. Smart,et al. Identity-Based Encryption Gone Wild , 2006, ICALP.
[18] Eike Kiltz,et al. Append-Only Signatures , 2005, ICALP.
[19] Dawn Xiaodong Song,et al. Homomorphic Signature Schemes , 2002, CT-RSA.