An identity based beta cryptosystem
暂无分享,去创建一个
[1] L.. Public-key cryptosystem design based on factoring and discrete logarithms , 2009 .
[2] U. Maurer,et al. A non-interactive public-key distribution system , 1996 .
[3] Chandrashekhar Meshram,et al. A Cryptosystem based on Double Generalized Discrete Logarithm Problem , 2011 .
[4] J. Gordon. Strong RSA keys , 1984 .
[5] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[6] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2006 .
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] Chandrashekhar Meshram. Modified ID-Based Public Key Cryptosystem Using Double Discrete Logarithm Problem , 2011 .
[9] Ashutosh Saxena,et al. Threshold key issuing in identity-based cryptosystems , 2007, Comput. Stand. Interfaces.
[10] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..
[11] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[12] Ueli Maurer,et al. Non-interactive Public-Key Cryptography , 1991, EUROCRYPT.
[13] L. Harn. Public-key cryptosystem design based on factoring and discrete logarithms , 1994 .
[14] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[15] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[16] Min-Shiang Hwang,et al. An improvement of an efficient user identification scheme based on ID-based cryptosystem , 2004, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[17] Wei-Bin Lee,et al. Constructing identity-based cryptosystems for discrete logarithm based cryptosystems , 2004, J. Netw. Comput. Appl..
[18] Eiji Okamoto,et al. Key distribution system based on identification information , 1989, IEEE J. Sel. Areas Commun..
[19] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[20] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[21] Chanathip Namprempre,et al. Security Proofs for Identity-Based Identification and Signature Schemes , 2004, EUROCRYPT.
[22] Jinn-ke Jan,et al. ID-based cryptographic schemes using a non-interactive public-key distribution system , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[23] Yevgeniy Vahlis,et al. CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption , 2008, CT-RSA.
[24] Toshiya Itoh,et al. An ID-based cryptosystem based on the discrete logarithm problem , 1989, IEEE J. Sel. Areas Commun..
[25] Eun-Kyung Ryu,et al. On the security of efficient user identification scheme , 2005, Appl. Math. Comput..
[26] Yuguang Fang,et al. An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.
[27] Jinhui Chao,et al. A Simple ID-Based Scheme for Key Sharing , 1993, IEEE J. Sel. Areas Commun..