A comparison between traditional public key infrastructures and identity-based cryptography
暂无分享,去创建一个
[1] Peter Gutmann,et al. PKI: It's Not Dead, Just Resting , 2002, Computer.
[2] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[3] Liqun Chen,et al. Applications of Multiple Trust Authorities in Pairing Based Cryptosystems , 2002, InfraSec.
[4] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[9] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.