Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Fast Digital Identity Revocation (Extended Abstract)
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
On the Security of Joint Signature and Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Key-Insulated Public Key Cryptosystems
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Hierarchical ID-Based Cryptography
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Efficient and Fresh Cerification
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Efficient Certificate Revocation
Efficient Certificate Revocation
A method for fast revocation of public key certificates and security capabilities
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Certificate revocation and certificate update
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
A forward-secure public-key encryption scheme
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Secure key issuing in ID-based cryptography
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Role-based cascaded delegation
Proceedings of the ninth ACM symposium on Access control models and technologies
Threshold key issuing in identity-based cryptosystems
Computer Standards & Interfaces
Addressing Credential Revocation in Grid Environments
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
An End-To-End Approach to Distributed Policy Language Implementation
Electronic Notes in Theoretical Computer Science (ENTCS)
Certificate-based verifiably encrypted signatures from pairings
Information Sciences: an International Journal
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
International Journal of Security and Networks
Improved certificate-based encryption in the standard model
Journal of Systems and Software
Self-certified Signatures Based on Discrete Logarithms
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Certificate-Based Signature Schemes without Pairings or Random Oracles
ISC '08 Proceedings of the 11th international conference on Information Security
Efficient Certificate-Based Encryption in the Standard Model
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Identity-based encryption with efficient revocation
Proceedings of the 15th ACM conference on Computer and communications security
Black-box accountable authority identity-based encryption
Proceedings of the 15th ACM conference on Computer and communications security
Certificate-based sequential aggregate signature
Proceedings of the second ACM conference on Wireless network security
Information Security Applications
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
RSA-Based Certificateless Public Key Encryption
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Asymmetric Group Key Agreement
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model
Information Security and Cryptology
Certified Encryption Revisited
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Conjunctive Broadcast and Attribute-Based Encryption
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
A security framework with strong non-repudiation and privacy in VANETs
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Efficient certificate-based signcryption scheme from bilinear pairings
International Journal of Computers and Applications
Certificate based (linkable) ring signature
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
A closer look at PKI: security and efficiency
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Identity-based key issuing without secure channel in a broad area
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Protecting against key escrow and key exposure in identity-based cryptosystem
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
Reducing trust in the PKG in identity based cryptosystems
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
A certificate-based proxy cryptosystem with revocable proxy decryption power
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Certificate revocation using fine grained certificate space partitioning
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Certificateless encryption schemes strongly secure in the standard model
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
An interpretation of identity-based cryptography
Foundations of security analysis and design IV
Constructions of certificate-based signature secure against key replacement attacks
Journal of Computer Security - The 2007 European PKI Workshop: Theory and Practice (EuroPKI'07)
Practical security for disconnected nodes
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Porscha: policy oriented secure content handling in Android
Proceedings of the 26th Annual Computer Security Applications Conference
Independently verifiable decentralized role-based delegation
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
How to construct identity-based signatures without the key escrow problem
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Identity-based proxy cryptosystems with revocability and hierarchical confidentialities
ICICS'10 Proceedings of the 12th international conference on Information and communications security
How to design space efficient revocable IBE from non-monotonic ABE
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Self-certified ring signatures
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Enhanced Certificate-Based Encryption from pairings
Computers and Electrical Engineering
Short and efficient certificate-based signature
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
An efficient short certificate-based signature scheme
Journal of Systems and Software
Identity-Based hierarchical strongly key-insulated encryption and its application
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Boneh-Franklin identity based encryption revisited
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Reconsideration on the security of the boneh-franklin identity-based encryption scheme
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
ID-Based signature scheme without trusted PKG
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Security analysis and improvement for key issuing schemes in ID-Based cryptography
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
CBE from CL-PKE: a generic construction and efficient schemes
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Chosen-ciphertext security of multiple encryption
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority
Journal of Systems and Software
Interoperation between a conventional PKI and an ID-Based infrastructure
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Certificateless public key encryption without pairing
ISC'05 Proceedings of the 8th international conference on Information Security
New ID-Based threshold signature scheme from bilinear pairings
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Separable implicit certificate revocation
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
On constructing certificateless cryptosystems from identity based encryption
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Security-Mediated certificateless cryptography
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Certificateless public-key signature: security model and efficient construction
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
How to solve key escrow and identity revocation in identity-based encryption schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
Computer Networks: The International Journal of Computer and Telecommunications Networking
RIKE: using revocable identities to support key escrow in PKIs
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Fully private revocable predicate encryption
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Certificate-based signcryption with enhanced security features
Computers & Mathematics with Applications
Unified security architecture and protocols using third party identity in V2V and V2I networks
Wireless Communications & Mobile Computing
Certificateless public key encryption in the selective-ID security model
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
General and efficient certificateless public key encryption constructions
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Certificate-based signature: security model and efficient construction
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Efficient escrow-free identity-based signature
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Certificate-Based encryption scheme with general access structure
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
Security and Communication Networks
Efficient self-certified signatures with batch verification
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
A forward-secure certificate-based signature scheme in the standard model
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Accountable authority identity-based encryption with public traceability
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Provably secure certificate-based signature scheme without pairings
Information Sciences: an International Journal
Certificate-based proxy decryption systems with revocability in the standard model
Information Sciences: an International Journal
On the conventional public key in identification-based encryption: the case of RSA
International Journal of Information and Computer Security
Symmetric Threshold Multipath (STM): An online symmetric key management scheme
Information Sciences: an International Journal
Hi-index | 0.00 |
We introduce the notion of certificate-based encryption. In this model, a certificate - or, more generally, a signature - acts not only as a certificate but also as a decryption key. To decrypt a message, a keyholder needs both its secret key and an up-to-date certificate from its CA (or a signature from an authorizer). Certificate-based encryption combines the best aspects of identity-based encryption (implicit certification) and public key encryption (no escrow). We demonstrate how certificate-based encryption can be used to construct an efficient PKI requiring less infrastructure than previous proposals, including Micali's Novomodo, Naor-Nissim and Aiello-Lodha-Ostrovsky.