A New Efficient Certificateless Multi-Receiver Public Key Encryption Scheme
暂无分享,去创建一个
Ling Xie | Jun Zhu | Lin-Lin Chen | Xian Zhu | Xianwei Zhu | Jun Zhu | Linjuan Chen | Ling Xie
[1] Richard Comley,et al. Efficient Certificateless Public Key Encryption , 2005, IACR Cryptol. ePrint Arch..
[2] Pooya Farshim,et al. Generic Constructions of Identity-Based and Certificateless KEMs , 2008, Journal of Cryptology.
[3] Yevgeniy Dodis,et al. Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack , 2003, Public Key Cryptography.
[4] Yevgeniy Dodis,et al. Public Key Broadcast Encryption for Stateless Receivers , 2002, Digital Rights Management Workshop.
[5] Joonsang Baek,et al. Strongly Secure Certificateless Public Key Encryption Without Pairing , 2007, CANS.
[6] Kenneth G. Paterson,et al. Certificateless Encryption Schemes Strongly Secure in the Standard Model , 2008, Public Key Cryptography.
[7] Jiao Licheng,et al. Design and Analysis of a Provable Secure Multi-Recipient Public Key Encryption Scheme , 2009 .
[8] M. Bellare,et al. Multi-Recipient Encryption Schemes: Security Notions and Randomness Re-Use , 2003 .
[9] Zeng Sheng-k. Deniable Ring Authentication Based on Multi-receiver Encryption , 2015 .
[10] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[11] Joonsang Baek,et al. Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption , 2005, Public Key Cryptography.
[12] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[13] Kaoru Kurosawa,et al. Multi-recipient Public-Key Encryption with Shortened Ciphertext , 2002, Public Key Cryptography.
[14] Ran Canetti,et al. A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.
[15] Silvio Micali,et al. Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements , 2000, EUROCRYPT.
[16] Limin Shen,et al. Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles , 2014, Secur. Commun. Networks.
[17] Hui Li,et al. Certificateless Signcryption KEM to Multiple Recipients: Certificateless Signcryption KEM to Multiple Recipients , 2010 .