Sciweavers

1610 search results - page 29 / 322
» Identity Based Multisignatures
Sort
View
CORR
2007
Springer
122views Education» more  CORR 2007»
13 years 8 months ago
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
Abstract. Identity-based encryption (IBE) schemes are usually used in multiplePKG environments — on the one hand, each administrative domain (e.g., a relatively small and close o...
Shengbao Wang
JISE
2008
89views more  JISE 2008»
13 years 8 months ago
Identity-Based Parallel Key-Insulated Signature Without Random Oracles
Jian Weng, Xiangxue Li, Kefei Chen, Shengli Liu
JOC
2008
64views more  JOC 2008»
13 years 8 months ago
Generic Constructions of Identity-Based and Certificateless KEMs
We extend the concept of key encapsulation mechanisms to the primitives of ID-based and certificateless encryption. We show that the natural combination of ID-KEMs or CL-KEMs with ...
Kamel Bentahar, Pooya Farshim, John Malone-Lee, Ni...
ERCIM
2007
66views more  ERCIM 2007»
13 years 8 months ago
TraSer - Identity-Based Tracking and Web Services for SMEs
Zsolt Kemény, Marcell Szathmari
SCN
2008
Springer
13 years 8 months ago
An Identity-Based Key Agreement Protocol for the Network Layer
A new identity-based key agreement protocol designed to operate on thenetworklayerispresented. Endpoint addresses, namelyIP and MAC addresses, areusedaspublickeystoauthenticatethe ...
Christian Schridde, Matthew Smith, Bernd Freislebe...