Binary Tree Encryption: Constructions and Applications
- 1 January 2004
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 14 references indexed in Scilit:
- Chosen-Ciphertext Security from Identity-Based EncryptionLecture Notes in Computer Science, 2004
- Cryptography and cryptographic protocolsDistributed Computing, 2003
- A Forward-Secure Public-Key Encryption SchemeLecture Notes in Computer Science, 2003
- Strong Key-Insulated Signature SchemesLecture Notes in Computer Science, 2002
- Hierarchical ID-Based CryptographyLecture Notes in Computer Science, 2002
- Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption CaseLecture Notes in Computer Science, 2002
- Toward Hierarchical Identity-Based EncryptionLecture Notes in Computer Science, 2002
- An Identity Based Encryption Scheme Based on Quadratic ResiduesLecture Notes in Computer Science, 2001
- Identity-Based Cryptosystems and Signature SchemesPublished by Springer Science and Business Media LLC ,2000
- A One Round Protocol for Tripartite Diffie–HellmanLecture Notes in Computer Science, 2000