Sciweavers

97 search results - page 7 / 20
» Fuzzy Identity-Based Encryption
Sort
View
ESORICS
2007
Springer
14 years 1 months ago
Generalized Key Delegation for Hierarchical Identity-Based Encryption
Michel Abdalla, Eike Kiltz, Gregory Neven
EUROCRYPT
2005
Springer
14 years 1 months ago
Hierarchical Identity Based Encryption with Constant Size Ciphertext
Dan Boneh, Xavier Boyen, Eu-Jin Goh
CRYPTO
2001
Springer
134views Cryptology» more  CRYPTO 2001»
13 years 12 months ago
Identity-Based Encryption from the Weil Pairing
in SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer S...
Dan Boneh, Matthew K. Franklin
IMA
2001
Springer
117views Cryptology» more  IMA 2001»
13 years 12 months ago
An Identity Based Encryption Scheme Based on Quadratic Residues
We present a novel public key cryptosystem in which the public key of a subscriber can be chosen to be a publicly known value, such as his identity. We discuss the security of the ...
Clifford Cocks