A Performance Analysis of Identity-Based Encryption Schemes
暂无分享,去创建一个
Yan Gu | Zhen Chen | Jianfei Wang | Jiwei Huang | Zihong Lv | Pengqi Cheng | Wenlei Zhu | Zhen Chen | Zihong Lv | Jiwei Huang | Yan Gu | Pengqi Cheng | Jianfei Wang | Wenlei Zhu
[1] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[2] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[3] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[4] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[5] A. Shamm. Identity-based cryptosystems and signature schemes , 1985 .
[6] Yuliang Zheng,et al. Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.
[7] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[8] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[9] Ben Lynn,et al. Authenticated Identity-Based Encryption , 2002, IACR Cryptol. ePrint Arch..
[10] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[11] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[12] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.