Cryptographic Reverse Firewalls for Identity-Based Encryption
暂无分享,去创建一个
Fagen Li | Yuyang Zhou | Yuanfeng Guan | Zhiwei Zhang | Fagen Li | Yuyang Zhou | Yuanfeng Guan | Zhiwei Zhang
[1] Xi Fang,et al. 3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .
[2] Yevgeniy Dodis,et al. Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines , 2016, CRYPTO.
[3] Brent Waters,et al. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) , 2006, CRYPTO.
[4] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[5] Glenn Greenwald,et al. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State , 2014 .
[6] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[7] Ilya Mironov,et al. Cryptographic Reverse Firewalls , 2015, EUROCRYPT.
[8] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[9] Moti Yung,et al. The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? , 1996, CRYPTO.
[10] Fuchun Guo,et al. Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions , 2016, ASIACRYPT.
[11] Guomin Yang,et al. Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines , 2018, ESORICS.
[12] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[13] Moti Yung,et al. Cliptography: Post-Snowden Cryptography , 2017, CCS.
[14] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.