General Certificateless Encryption and Timed-Release Encryption
暂无分享,去创建一个
[1] Sanjit Chatterjee,et al. New Constructions of Constant Size Ciphertext HIBE Without Random Oracle , 2006, ICISC.
[2] Rafail Ostrovsky,et al. Conditional Oblivious Transfer and Timed-Release Encryption , 1999, EUROCRYPT.
[3] Jean-Jacques Quisquater,et al. Efficient and Non-interactive Timed-Release Encryption , 2005, ICICS.
[4] Qiang Tang,et al. Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability , 2006, IACR Cryptol. ePrint Arch..
[5] Joseph K. Liu,et al. Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.
[6] Qiang Tang,et al. Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability , 2007, ISC.
[7] Ronald L. Rivest,et al. Time-lock Puzzles and Timed-release Crypto , 1996 .
[8] Dimitrios Hristu-Varsakelis,et al. Improved Anonymous Timed-Release Encryption , 2007, ESORICS.
[9] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[10] Nigel P. Smart,et al. Escrow-free encryption supporting cryptographic workflow , 2006, International Journal of Information Security.
[11] Xiaotie Deng,et al. Certificateless signature: a new security model and an improved generic construction , 2007, Des. Codes Cryptogr..
[12] Konstantinos Chalkias,et al. Timed Release Cryptography from Bilinear Pairings Using Hash Chains , 2006, Communications and Multimedia Security.
[13] Ran Canetti,et al. A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.
[14] Alexander W. Dent,et al. A survey of certificateless encryption schemes and security models , 2008, International Journal of Information Security.
[15] Joonsang Baek,et al. Certificateless Public Key Encryption Without Pairing , 2005, ISC.
[16] Kenneth G. Paterson,et al. Certificateless Encryption Schemes Strongly Secure in the Standard Model , 2008, Public Key Cryptography.
[17] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[18] Jung Hee Cheon,et al. Timed-Release and Key-Insulated Public Key Encryption , 2006, Financial Cryptography.
[19] Joonsang Baek,et al. Strongly Secure Certificateless Public Key Encryption Without Pairing , 2007, CANS.
[20] Manuel Barbosa,et al. Secure Cryptographic Workflow in the Standard Model , 2006, IACR Cryptol. ePrint Arch..
[21] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[22] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[23] Ian F. Blake,et al. Scalable, Server-Passive, User-Anonymous Timed Release Cryptography , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[24] Sherman S. M. Chow. Token-Controlled Public Key Encryption in the Standard Model , 2007, ISC.
[25] Dong Hoon Lee,et al. Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles) , 2007, Pairing.
[26] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[27] Bo-Chao Cheng,et al. A Theoretical Security Model for Access Control and Security Assurance , 2007 .
[28] Pil Joong Lee,et al. Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System , 2005, ISC.
[29] Ali Miri,et al. Hierarchical time-based information release , 2006, International Journal of Information Security.
[30] Sanjit Chatterjee,et al. On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters (With an Exposition of Waters' Artificial Abort Technique) , 2006, IACR Cryptol. ePrint Arch..
[31] Colin Boyd,et al. Security-Mediated Certificateless Cryptography , 2006, Public Key Cryptography.
[32] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[33] Konstantinos Chalkias,et al. Low-cost Anonymous Timed-Release Encryption , 2007 .
[34] Junzuo Lai,et al. Self-Generated-Certificate Public Key Encryption Without Pairing , 2007, Public Key Cryptography.
[35] Qixiang Mei,et al. Direct chosen ciphertext security from identity-based techniques , 2005, CCS '05.