Identity Based Secure RSA Encryption System
暂无分享,去创建一个
[1] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[2] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[3] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[4] Yi Mu,et al. Identity-Based Mediated RSA Revisited , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[5] Ibrahim F. Elashry. Pairing-free identity-based cryptography , 2015 .
[6] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[7] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[8] Minghui Zheng,et al. An Improved Identity-Based Encryption Scheme Without Bilinear Map , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[9] Craig Gentry,et al. Space-Efficient Identity Based EncryptionWithout Pairings , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[10] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[11] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[12] Yi Mu,et al. An Efficient Variant of Boneh-Gentry-Hamburg's Identity-Based Encryption Without Pairing , 2014, WISA.
[13] Gerhard Frey,et al. The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems , 1999, IEEE Trans. Inf. Theory.
[14] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1993, IEEE Trans. Inf. Theory.
[15] Gene Tsudik,et al. Simple Identity-Based Cryptography with Mediated RSA , 2003, CT-RSA.
[16] Mahabir Prasad Jhanwar,et al. A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme , 2009, Inscrypt.