Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle
暂无分享,去创建一个
Cheng-Chi Lee | Sarita Gajbhiye Meshram | Chandrashekhar Meshram | Cheng-Chi Lee | S. G. Meshram | C. Meshram
[1] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[2] Chandrashekhar Meshram,et al. An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem , 2015, Inf. Process. Lett..
[3] Yevgeniy Vahlis,et al. CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption , 2008, CT-RSA.
[4] Dan Boneh,et al. Secure Identity Based Encryption Without Random Oracles , 2004, CRYPTO.
[5] Cheng-Chi Lee,et al. An IBE Technique Using Partial Discrete Logarithm , 2016 .
[6] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[7] Mingwu Zhang,et al. An ID-based cryptographic mechanisms based on GDLP and IFP , 2012, Inf. Process. Lett..
[8] Feng Wang,et al. Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues , 2016, Int. J. Netw. Secur..
[9] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[10] Chandrashekhar Meshram,et al. An identity based beta cryptosystem , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[11] Mohammad S. Obaidat,et al. An ID-based Quadratic-Exponentiation Randomized Cryptographic scheme , 2015, 2015 International Conference on Computer, Information and Telecommunication Systems (CITS).
[12] Jayaprakash Kar. Provably Secure Identity-based Aggregate Signcryption Scheme in Random Oracles , 2015, Int. J. Netw. Secur..
[13] Chanathip Namprempre,et al. Security Proofs for Identity-Based Identification and Signature Schemes , 2004, EUROCRYPT.
[14] Chandrashekhar Meshram,et al. An efficient ID-based Beta Cryptosystem , 2015 .
[15] Chandrashekhar Meshram,et al. NEW IDENTITY-BASED CRYPTOGRAPHIC SCHEME FOR IFP AND DLP BASED CRYPTOSYSTEM , 2012 .
[16] Wei-Bin Lee,et al. Constructing identity-based cryptosystems for discrete logarithm based cryptosystems , 2004, J. Netw. Comput. Appl..
[17] Chandrashekhar Meshram,et al. Factoring and Discrete Logarithm using IBC , 2015 .
[18] Chandrashekhar Meshram,et al. An efficient identity-based QER cryptographic scheme , 2016 .
[19] Chandrashekhar Meshram,et al. An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem , 2013, Inf. Process. Lett..
[20] Bazara I. A. Barry,et al. A New Level 3 Trust Hierarchal Certificateless Public Key Cryptography Scheme in the Random Oracle Model , 2017, Int. J. Netw. Secur..
[21] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[22] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.