Lightweight and Secure Certificateless Multi-receiver Encryption based on ECC
暂无分享,去创建一个
Shinji Shimojo | Tomoki Yoshihisa | Tomoya Kawakami | Yuuichi Teranishi | Yoshimasa Ishi | Ei Khaing Win | S. Shimojo | T. Yoshihisa | Y. Teranishi | Tomoya Kawakami | Yoshimasa Ishi
[1] Yang Ming,et al. Multi-receiver Identity-Based Key Encapsulation in the Standard Model , 2010, 2010 International Conference of Information Science and Management Engineering.
[2] Joonsang Baek,et al. Certificateless Public Key Encryption Without Pairing , 2005, ISC.
[3] C. Pandu Rangan,et al. Efficient and Provably Secure Certificateless Multi-receiver Signcryption , 2008, ProvSec.
[4] Chun-I Fan,et al. Anonymous Multireceiver Identity-Based Encryption , 2010, IEEE Transactions on Computers.
[5] Young-Ran Lee,et al. An Authenticated Certificateless Public Key Encryption Scheme , 2004, IACR Cryptol. ePrint Arch..
[6] Peter Gutmann,et al. PKI: It's Not Dead, Just Resting , 2002, Computer.
[7] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[8] Joonsang Baek,et al. Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption , 2005, Public Key Cryptography.
[9] Jianhong Zhang,et al. An improved anonymous multi-receiver identity-based encryption scheme , 2015, Int. J. Commun. Syst..
[10] Xiaolei Dong,et al. Multi-Receiver Identity-Based Encryption in Multiple PKG Environment , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[11] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[12] Shinji Shimojo,et al. A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication , 2017, 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC).
[13] Dong Hoon Lee,et al. Efficient Certificateless Signature Schemes , 2007, ACNS.
[14] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[15] Xiaochun Cheng,et al. Efficient Identity-based Broadcast Encryption without Random Oracles , 2010, J. Comput..
[16] Nicky Mouha,et al. Report on Lightweight Cryptography , 2017 .
[17] Ling Xie,et al. A New Efficient Certificateless Multi-Receiver Public Key Encryption Scheme , 2016 .
[18] Jun Furukawa,et al. Identity-Based Broadcast Encryption , 2007, IACR Cryptol. ePrint Arch..
[19] C. Pandu Rangan,et al. A note on the Certificateless Multi-receiver Signcryption Scheme , 2009, IACR Cryptol. ePrint Arch..
[20] Jakob Nielsen,et al. Usability engineering , 1997, The Computer Science and Engineering Handbook.
[21] Shengbao Wang,et al. Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications , 2007, IACR Cryptol. ePrint Arch..
[22] Joonsang Baek,et al. Strongly Secure Certificateless Public Key Encryption Without Pairing , 2007, CANS.
[23] Chun-I Fan,et al. Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security , 2015, Symmetry.
[24] C. Pandu Rangan,et al. An Efficient Identity-Based Signcryption Scheme for Multiple Receivers , 2009, IWSEC.
[25] Masahiro Yoshida,et al. Multi-access Edge Computing: A Survey , 2018, J. Inf. Process..
[26] Han Jiang,et al. An Efficient Dynamic Identity-based Broadcast Encryption Scheme , 2010, 2010 Second International Symposium on Data, Privacy, and E-Commerce.
[27] Chul Sur,et al. Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption , 2007, 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security (BLISS 2007).
[28] Cécile Delerablée,et al. Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys , 2007, ASIACRYPT.
[29] Angelo De Caro,et al. jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[30] John A. Hoxmeier,et al. System Response Time and User Satisfaction: An Experimental Study of Browser-based Applications , 2000 .