Sciweavers

231 search results - page 17 / 47
» Generalized Identity Based and Broadcast Encryption Schemes
Sort
View
DIM
2005
ACM
15 years 5 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
FC
2004
Springer
120views Cryptology» more  FC 2004»
15 years 9 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
147
Voted
ICPADS
2005
IEEE
15 years 9 months ago
Separable and Anonymous Identity-Based Key Issuing
Abstract. In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is respo...
Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hu...
109
Voted
ICC
2000
IEEE
15 years 8 months ago
A Novel Push-and-Pull Hybrid Data Broadcast Scheme for Wireless Information Networks
: A new push-and-pull hybrid data broadcast scheme is proposed for providing wireless information services to three types of clients, general, pull and priority clients. Only pull ...
Jian-Hao Hu, Kwan Lawrence Yeung, Gang Feng, K. F....
137
Voted
IJISEC
2006
113views more  IJISEC 2006»
15 years 3 months ago
Escrow-free encryption supporting cryptographic workflow
Since Boneh and Franklin published their seminal paper on identity based encryption (IBE) using the Weil pairing , there has been a great deal of interest in cryptographic primitiv...
Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Sma...