Practical parallel key-insulated encryption with multiple helper keys
暂无分享,去创建一个
[1] Masao Mukaidono,et al. Selection of Model in Developing Information Security Criteria on Smart Grid Security System , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.
[2] Brent Waters,et al. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..
[3] Shouhuai Xu,et al. Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.
[4] M. Taheri,et al. A secure method on a routing protocol for ad hoc networks , 2010, 2010 International Conference on Educational and Network Technology.
[5] Hideki Imai,et al. Parallel Key-Insulated Public Key Encryption , 2006, Public Key Cryptography.
[6] Moti Yung,et al. Parallel Key-Insulated Public Key Encryption Without Random Oracles , 2007, Public Key Cryptography.
[7] Bing He,et al. On secure communication in integrated heterogeneous wireless networks , 2010, Int. J. Inf. Technol. Commun. Convergence.
[8] Jian Weng,et al. Identity-Based Threshold Key-Insulated Encryption without Random Oracles , 2008, CT-RSA.
[9] Allison Bishop,et al. New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts , 2010, IACR Cryptol. ePrint Arch..
[10] Yanli Ren,et al. CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles , 2010, J. Syst. Softw..
[11] Shiuh-Jeng Wang,et al. Hierarchical key derivation scheme for group-oriented communication systems , 2010, Int. J. Inf. Technol. Commun. Convergence.
[12] Koutarou Suzuki,et al. Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts , 2011, IACR Cryptol. ePrint Arch..
[13] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[14] Jian Weng,et al. Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction , 2006, INDOCRYPT.
[15] Shouhuai Xu,et al. Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.
[16] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[17] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[18] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..