CBE from CL-PKE: A Generic Construction and Efficient Schemes
暂无分享,去创建一个
[1] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[2] Pil Joong Lee,et al. Identity-Based Cryptography in Public Key Management , 2004, EuroPKI.
[3] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[4] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[5] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[6] Antonio Laganà,et al. Computational Science and Its Applications – ICCSA 2004 , 2004, Lecture Notes in Computer Science.
[7] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[8] Pil Joong Lee,et al. Generic Construction of Certificateless Encryption , 2004, ICCSA.
[9] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[10] Pil Joong Lee,et al. Generic Construction of Certificateless Signature , 2004, ACISP.
[11] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[12] Sattam S. Al-Riyami. Cryptographic schemes based on elliptic curve pairings , 2004 .
[13] Tatsuaki Okamoto. Topics in Cryptology – CT-RSA 2004 , 2004, Lecture Notes in Computer Science.
[14] Je Hong Park,et al. A Certificate-Based Signature Scheme , 2004, CT-RSA.
[15] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[16] Chi Sung Laih,et al. Advances in Cryptology - ASIACRYPT 2003 , 2003 .