Reducing Trust in the PKG in Identity Based Cryptosystems
暂无分享,去创建一个
[1] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[2] Byoungcheon Lee,et al. Secure Key Issuing in ID-based Cryptography , 2004, ACSW.
[3] Brent Waters,et al. Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.
[4] J. Camenisch,et al. Proof systems for general statements about discrete logarithms , 1997 .
[5] Matthew Green,et al. Blind Identity-Based Encryption and Simulatable Oblivious Transfer , 2007, ASIACRYPT.
[6] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[7] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[8] Qixiang Mei,et al. Direct chosen ciphertext security from identity-based techniques , 2005, CCS '05.
[9] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[10] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[11] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[12] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[13] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[14] Dan Boneh,et al. Secure Identity Based Encryption Without Random Oracles , 2004, CRYPTO.
[15] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[16] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[17] Jonathan Katz,et al. Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption , 2005, CT-RSA.
[18] Ben Lynn,et al. Toward Hierarchical Identity-Based Encryption , 2002, EUROCRYPT.
[19] Kenneth G. Paterson,et al. Certiflcateless Public Key Cryptography , 2003 .
[20] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[21] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..
[22] Carl Pomerance,et al. Advances in Cryptology — CRYPTO ’87 , 2000, Lecture Notes in Computer Science.
[23] C. Moler,et al. Advances in Cryptology , 2000, Lecture Notes in Computer Science.
[24] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[25] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[26] Yael Tauman Kalai. Smooth Projective Hashing and Two-Message Oblivious Transfer , 2005, EUROCRYPT.
[27] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[28] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[29] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[30] Yevgeniy Dodis,et al. A Verifiable Random Function with Short Proofs and Keys , 2005, Public Key Cryptography.
[31] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[32] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[33] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[34] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[35] Mihir Bellare,et al. On Defining Proofs of Knowledge , 1992, CRYPTO.
[36] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[37] Ran Canetti,et al. A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.
[38] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[39] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[40] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[41] Abhi Shelat,et al. Simulatable Adaptive Oblivious Transfer , 2007, EUROCRYPT.