Short Hierarchical Identity-based Encryption in the Selective-ID Model
暂无分享,去创建一个
[1] Wei Yuan,et al. Analysis and Enhancement of Three Identity-based Signcryption Protocols , 2012, J. Comput..
[2] Dan Boneh,et al. Efficient Lattice (H)IBE in the Standard Model , 2010, EUROCRYPT.
[3] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[4] Yang Lu,et al. Generic Construction of Forward-Secure Identity-Based Encryption , 2012, J. Comput..
[5] Koutarou Suzuki,et al. Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts , 2011, IACR Cryptol. ePrint Arch..
[6] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[7] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[8] Yanli Ren,et al. Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model , 2008, Informatica.
[9] Liang Yan,et al. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography , 2009, CloudCom.
[10] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[11] Brent Waters,et al. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..
[12] Wei Yuan,et al. Cryptanalysis and Improvement of an ID-Based Threshold Signcryption Scheme , 2012, J. Comput..
[13] Yupu Hu,et al. Hierarchical Identity‐Based Encryption with Constant‐Size Private Keys , 2012 .
[14] David Cash,et al. How to Delegate a Lattice Basis , 2009, IACR Cryptol. ePrint Arch..
[15] Fei Li,et al. An Efficient Certificateless Threshold Decryption Schemes Based On Pairings , 2012, J. Comput..
[16] Allison Bishop,et al. New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts , 2010, IACR Cryptol. ePrint Arch..