Implicit and Explicit Certificates-Based Encryption Scheme
暂无分享,去创建一个
Jerzy Pejas | Tomasz Hyla | Witold Mackow | W. Macków | J. Pejas | T. Hyla
[1] Yang Lu,et al. Constructing Efficient Certificate-based Encryption with Paring , 2009, J. Comput..
[2] M. Kasahara,et al. A New Traitor Tracing , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[3] Liqun Chen,et al. Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme , 2005, IMACC.
[4] Jerzy Pejas,et al. Certificate-Based Encryption Scheme with General Access Structure , 2012, CISIM.
[5] Jerzy Pejas,et al. A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture , 2013, CISIM.
[6] Ben Lynn,et al. On the implementation of pairing-based cryptosystems , 2007 .
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] Masao Kasahara,et al. ID based Cryptosystems with Pairing on Elliptic Curve , 2003, IACR Cryptol. ePrint Arch..
[9] Khalid Saeed,et al. Computer Information Systems and Industrial Management , 2012, Lecture Notes in Computer Science.
[10] Günther Pernul,et al. Public Key Infrastructures, Services and Applications , 2011, Lecture Notes in Computer Science.
[11] Colin Boyd,et al. Cryptography and Coding , 1995, Lecture Notes in Computer Science.
[12] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[13] Reihaneh Safavi-Naini,et al. An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.
[14] Junzuo Lai,et al. Self-Generated-Certificate Public Key Encryption Without Pairing , 2007, Public Key Cryptography.
[15] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[16] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[17] Tatsuaki Okamoto,et al. Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings , 2007, Public Key Cryptography.
[18] Alexander W. Dent,et al. A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures , 2009, EuroPKI.
[19] Joseph K. Liu,et al. Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.
[20] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[21] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[22] Robert H. Deng,et al. Public Key Cryptography – PKC 2004 , 2004, Lecture Notes in Computer Science.
[23] Yi Mu,et al. Malicious KGC attacks in certificateless cryptography , 2007, ASIACCS '07.
[24] Chi Sung Laih,et al. Advances in Cryptology - ASIACRYPT 2003 , 2003 .
[25] Joonsang Baek,et al. Certificateless Public Key Encryption Without Pairing , 2005, ISC.
[26] Sherman S. M. Chow. Certificateless Encryption , 2009, Identity-Based Cryptography.