Identity-Based Encryption Gone Wild
- 1 January 2006
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 300-311
- https://doi.org/10.1007/11787006_26
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Identity-Based Encryption Gone WildLecture Notes in Computer Science, 2006
- Hierarchical Identity Based Encryption with Constant Size CiphertextLecture Notes in Computer Science, 2005
- Efficient Selective-ID Secure Identity-Based Encryption Without Random OraclesLecture Notes in Computer Science, 2004
- Chosen-Ciphertext Security from Identity-Based EncryptionLecture Notes in Computer Science, 2004
- Identity-Based Encryption from the Weil PairingSIAM Journal on Computing, 2003
- Hierarchical ID-Based CryptographyLecture Notes in Computer Science, 2002
- Toward Hierarchical Identity-Based EncryptionLecture Notes in Computer Science, 2002
- An Identity Based Encryption Scheme Based on Quadratic ResiduesLecture Notes in Computer Science, 2001
- Identity-Based Cryptosystems and Signature SchemesPublished by Springer Science and Business Media LLC ,2000
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993