Sciweavers

97 search results - page 8 / 20
» Fuzzy Identity-Based Encryption
Sort
View
CANS
2006
Springer
106views Cryptology» more  CANS 2006»
13 years 11 months ago
Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi,...
EUROCRYPT
2004
Springer
13 years 11 months ago
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
An extended abstract of this paper appears in C. Cachin and J. Camenisch, editors, Advances in Cryptology-EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 22...
Dan Boneh, Xavier Boyen
COMPUTER
2008
55views more  COMPUTER 2008»
13 years 7 months ago
Identity-Based Encryption Comes of Age
Luther Martin
SCN
2008
Springer
147views Communications» more  SCN 2008»
13 years 7 months ago
New Anonymity Notions for Identity-Based Encryption
ded abstract of this paper appeared in Proceedings of the 6th Conference on Security and Cryptography for Networks (SCN '08)
Malika Izabachène, David Pointcheval
PKC
2007
Springer
117views Cryptology» more  PKC 2007»
14 years 1 months ago
Identity-Based Traitor Tracing
We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming the bilinear decision Diffie-Hellman (DBDH) is hard in...
Michel Abdalla, Alexander W. Dent, John Malone-Lee...