An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet
暂无分享,去创建一个
[1] Limin Shen,et al. Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles , 2014, Secur. Commun. Networks.
[2] Junji Shikata,et al. Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions , 2002, ICICS.
[3] Guang Yang,et al. Mitigating Key Escrow in Attribute-Based Encryption , 2015, Int. J. Netw. Secur..
[4] Kenneth G. Paterson,et al. Certificateless Encryption Schemes Strongly Secure in the Standard Model , 2008, Public Key Cryptography.
[5] Hideki Imai,et al. Parallel Key-Insulated Public Key Encryption , 2006, Public Key Cryptography.
[6] N. Ravi Shankar,et al. A New Modular Multiplication Method in Public Key Cryptosystem , 2013, Int. J. Netw. Secur..
[7] Jean-Jacques Quisquater,et al. On Constructing Certificateless Cryptosystems from Identity Based Encryption , 2006, Public Key Cryptography.
[8] V. P. Jagathy Raj,et al. Practical Implementation of a Secure Email System Using Certificateless Cryptography and Domain Name System , 2016, Int. J. Netw. Secur..
[9] Gene Itkis,et al. SiBIR: Signer-Base Intrusion-Resilient Signatures , 2002, CRYPTO.
[10] Wei Chen,et al. An ID-based online/offline signature scheme without random oracles for wireless sensor networks , 2012, Personal and Ubiquitous Computing.
[11] Carl Youngblood,et al. An Introduction to Identity-based Cryptography , 2006 .
[12] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[13] Joonsang Baek,et al. Certificateless Public Key Encryption Without Pairing , 2005, ISC.
[14] Bo Zhu,et al. Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN , 2009, ISA.
[15] Mihir Bellare,et al. Protecting against key-exposure: strongly key-insulated encryption with optimal threshold , 2005, Applicable Algebra in Engineering, Communication and Computing.
[16] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[17] Hui Li,et al. Short-ciphertext and BDH-based CCA2 secure certificateless encryption , 2010, Science China Information Sciences.
[18] Chunxiang Xu,et al. A Practical Forward-Secure Public-Key Encryption Scheme with Untrusted Update , 2015, Int. J. Netw. Secur..
[19] Li Ling,et al. General and Efficient Certificateless Public Key Encryption Constructions , 2007, Pairing.
[20] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[21] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.