Registration-Based Encryption: Removing Private-Key Generator from IBE
暂无分享,去创建一个
Sanjam Garg | Mohammad Mahmoody | Mohammad Hajiabadi | Ahmadreza Rahimi | Mohammad Mahmoody | Sanjam Garg | Mohammad Hajiabadi | Ahmadreza Rahimi
[1] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Luminita Vasiu,et al. Remove Key Escrow from The Identity-Based Encryption System , 2004, IFIP TCS.
[4] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[5] Nico Döttling,et al. Identity-Based Encryption from the Diffie-Hellman Assumption , 2017, CRYPTO.
[6] Vipul Goyal,et al. Reducing Trust in the PKG in Identity Based Cryptosystems , 2007, CRYPTO.
[7] Fang Qi,et al. Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation , 2018, Telecommun. Syst..
[8] Phillip Rogaway,et al. The Moral Character of Cryptographic Work , 2015, IACR Cryptol. ePrint Arch..
[9] Jayaprakash Kar,et al. Certificateless Public Key Cryptography: A Research Survey , 2016 .
[10] Brent Waters,et al. Witness encryption and its applications , 2013, STOC '13.
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[14] Nico Döttling,et al. Laconic Oblivious Transfer and Its Applications , 2017, CRYPTO.
[15] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[16] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[17] Vinod Vaikuntanathan,et al. Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions , 2018, IACR Cryptol. ePrint Arch..
[18] Liqun Chen,et al. Applications of Multiple Trust Authorities in Pairing Based Cryptosystems , 2002, InfraSec.
[19] Sherman S. M. Chow. Removing Escrow from Identity-Based Encryption , 2009, Public Key Cryptography.
[20] Kenneth G. Paterson,et al. Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities , 2008, Pairing.
[21] Ian Goldberg,et al. Distributed Private-Key Generators for Identity-Based Cryptography , 2010, SCN.
[22] Daniel Wichs,et al. On the Communication Complexity of Secure Function Evaluation with Long Output , 2015, IACR Cryptol. ePrint Arch..
[23] B. B. Zaidan,et al. A survey on communication components for IoT-based technologies in smart homes , 2018, Telecommunication Systems.
[24] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[25] Brent Waters,et al. Black-box accountable authority identity-based encryption , 2008, CCS.
[26] Nico Döttling,et al. New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes , 2018, Public Key Cryptography.