Secure Cryptographic Workflow in the Standard Model
暂无分享,去创建一个
[1] Kenneth G. Paterson,et al. Cryptography from Pairings: A Snapshot of Current Research , 2008 .
[2] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[3] Nigel P. Smart,et al. Escrow-free encryption supporting cryptographic workflow , 2006, International Journal of Information Security.
[4] Tatsuaki Okamoto,et al. On the Equivalence of Several Security Notions of Key Encapsulation Mechanism , 2006, IACR Cryptol. ePrint Arch..
[5] Nigel P. Smart. Access Control Using Pairing Based Cryptography , 2003, CT-RSA.
[6] Liqun Chen,et al. Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme , 2005, IMACC.
[7] Masao Kasahara,et al. ID based Cryptosystems with Pairing on Elliptic Curve , 2003, IACR Cryptol. ePrint Arch..
[8] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[9] Mihir Bellare,et al. Randomness Re-use in Multi-recipient Encryption Schemeas , 2003, Public Key Cryptography.
[10] Jonathan Katz,et al. Chosen-Ciphertext Security of Multiple Encryption , 2005, TCC.
[11] Adi Shamir,et al. How to share a secret , 1979, CACM.
[12] Eike Kiltz,et al. Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts , 2006, IACR Cryptol. ePrint Arch..
[13] Hugo Krawczyk,et al. Secret Sharing Made Short , 1994, CRYPTO.
[14] Pooya Farshim,et al. Generic Constructions of Identity-Based and Certificateless KEMs , 2008, Journal of Cryptology.
[15] Kent E. Seamons,et al. Concealing complex policies with hidden credentials , 2004, CCS '04.
[16] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[17] Jonathan Katz,et al. Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption , 2005, CT-RSA.
[18] Liqun Chen,et al. Applications of Multiple Trust Authorities in Pairing Based Cryptosystems , 2002, InfraSec.
[19] Silvio Micali,et al. Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements , 2000, EUROCRYPT.
[20] Hilarie K. Orman,et al. Hidden Credentials , 2003, WPES '03.
[21] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[22] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[23] Javier Herranz,et al. KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption , 2006 .
[24] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[25] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..
[26] Liqun Chen,et al. Multiple Trusted Authorities in Identifier Based Cryptography from Pairings on Elliptic Curves , 2003 .
[27] Alexander W. Dent,et al. A Designer's Guide to KEMs , 2003, IMACC.
[28] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.