How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Security of improved identity-based conference key distribution systems
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
A “paradoxical” identity-based signature scheme resulting from zero-knowledge
CRYPTO '88 Proceedings on Advances in cryptology
An identity-based identification scheme based on discrete logarithms modulo a composite number
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Can O.S.S. be repaired?: proposal for a new practical signature scheme
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
A Non-interactive Public-Key Distribution System
Designs, Codes and Cryptography
ID-based secret-key cryptography
ACM SIGOPS Operating Systems Review
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Secure key agreement for group communications
International Journal of Network Management
Securing IPv6 neighbor and router discovery
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
A group signature scheme with strong separability
Journal of Systems and Software
A Protocol for Establishing Secure Communication Channels in a Large Network
IEEE Transactions on Knowledge and Data Engineering
Applied Mathematics and Computation
Convertible authenticated encryption scheme
Journal of Systems and Software
A new key authentication scheme based on discrete logarithms
Applied Mathematics and Computation
A Self-Certified Group-Oriented Cryptosystem Without a Combiner
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
A Secure Mobile Agent System Applying Identity-Based Digital Signature Scheme
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Secret Distribution of Keys for Public-Key Systems
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
A Realization Scheme for the Identity-Based Cryptosystem
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
An Impersonation-Proof Identity Verfication Scheme
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Key Distribution Systems Based on Identification Information
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Identity-based Conference Key Distribution Systems
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
A New ID-Based Key Sharing System
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Provably Unforgeable Signatures
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
An Identity-Based Signature Scheme with Bounded Life-Span
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Toward Hierarchical Identity-Based Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Identity Based Authenticated Group Key Agreement Protocol
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Supersingular Curves in Cryptography
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Hierarchical ID-Based Cryptography
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ID-Based Blind Signature and Ring Signature from Pairings
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
A Cryptanalysis of the High-Bandwidth Digital Content Protection System
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
An Identity Based Encryption Scheme Based on Quadratic Residues
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Extended Proxy Signatures for Smart Cards
ISW '99 Proceedings of the Second International Workshop on Information Security
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
ISW '99 Proceedings of the Second International Workshop on Information Security
Certification of Public Keys within an Identity Based System
ISC '02 Proceedings of the 5th International Conference on Information Security
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Strong Key-Insulated Signature Schemes
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
How to Utilize the Randomness of Zero-Knowledge Proofs
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Identity-based confirmer signatures from pairings over elliptic curves
Proceedings of the 4th ACM conference on Electronic commerce
Secret Handshakes from Pairing-Based Key Agreements
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Efficient revocation and threshold pairing based cryptosystems
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Oblivious signature-based envelope
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Threshold signature scheme using self-certified public keys
Journal of Systems and Software
A note on Girault's self-certified model
Information Processing Letters
Designs, Codes and Cryptography
ID-based password authentication scheme using smart cards and fingerprints
ACM SIGOPS Operating Systems Review
Fine-grained control of security capabilities
ACM Transactions on Internet Technology (TOIT)
Secure key issuing in ID-based cryptography
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Universal forgery on a group signature scheme using self-certified public keys
Information Processing Letters
Authenticating tripartite key agreement protocol with pairings
Journal of Computer Science and Technology
Password-based user authentication and key distribution protocols for client-server applications
Journal of Systems and Software
Constructing identity-based cryptosystems for discrete logarithm based cryptosystems
Journal of Network and Computer Applications
Anonymous Wireless Authentication on a Portable Cellular Mobile System
IEEE Transactions on Computers
Identity-Based Fault-Tolerant Conference Key Agreement
IEEE Transactions on Dependable and Secure Computing
Theoretical Computer Science - Special issue: Foundations of wide area network computing
Robust ID-based threshold signcryption scheme from pairings
InfoSecu '04 Proceedings of the 3rd international conference on Information security
An efficient digital signature using self-certified public keys
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Transformation-free proxy cryptosystems and their applications to electronic commerce
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Cryptanalysis of group signature scheme from ID-based signature scheme
InfoSecu '04 Proceedings of the 3rd international conference on Information security
ID-based threshold decryption without random oracles and its application in key escrow
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Cryptanalysis of Xia-You group signature scheme
Journal of Systems and Software - Special issue: Software engineering education and training
Hardware and Software Normal Basis Arithmetic for Pairing-Based Cryptography in Characteristic Three
IEEE Transactions on Computers
An Identity Based Encryption system
Proceedings of the 3rd international symposium on Principles and practice of programming in Java
Reliable broadcast in unknown fixed-identity networks
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
Privacy enhanced cellular access security
Proceedings of the 4th ACM workshop on Wireless security
Pseudonym management using mediated identity-based cryptography
Proceedings of the 2005 workshop on Digital identity management
Authentication based on multilayer clustering in ad hoc networks
EURASIP Journal on Wireless Communications and Networking
Publicly verifiable ownership protection for relational databases
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Identity-based registry for secure interdomain routing
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Software implementation of Tate pairing over GF(2m)
Proceedings of the conference on Design, automation and test in Europe: Designers' forum
Distributed Ring Signatures from General Dual Access Structures
Designs, Codes and Cryptography
Refinements of Miller's algorithm for computing the Weil/Tate pairing
Journal of Algorithms
Oblivious signature-based envelope
Distributed Computing
Message authentication by integrity with public corroboration
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
An efficient identity-based signature scheme with batch verifications
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Implementation of cryptosystems based on Tate pairing
Journal of Computer Science and Technology
The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment
ICPADS '06 Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 2
Attribute-Based Access Control with Hidden Policies and Hidden Credentials
IEEE Transactions on Computers
An identity-based security framework For VANETs
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Location privacy in wireless personal area networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Provably secure non-interactive key distribution based on pairings
Discrete Applied Mathematics - Special issue: Coding and cryptography
Fitting Square Pegs into Round Holes
IEEE Security and Privacy
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Secure attribute-based systems
Proceedings of the 13th ACM conference on Computer and communications security
Forward-secure signatures with untrusted update
Proceedings of the 13th ACM conference on Computer and communications security
Certificateless signature: a new security model and an improved generic construction
Designs, Codes and Cryptography
Identity-based secure collaboration in wireless ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A novel proxy key generation protocol and its application
Computer Standards & Interfaces
Threshold key issuing in identity-based cryptosystems
Computer Standards & Interfaces
Simulatability and security of certificateless threshold signatures
Information Sciences: an International Journal
Self-certified signature scheme from pairings
Journal of Systems and Software
Concurrently-secure credential ownership proofs
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Journal of Theoretical and Applied Electronic Commerce Research
Secure pseudonym management using mediated identity-based encryption
Journal of Computer Security - The First ACM Workshop on Digital Identity Management -- DIM 2005
Establishing and protecting digital identity in federation systems
Journal of Computer Security - The First ACM Workshop on Digital Identity Management -- DIM 2005
Advances in network smart cards authentication
Computer Networks: The International Journal of Computer and Telecommunications Networking
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
Theoretical Computer Science
Identity based proxy multi-signature
Journal of Systems and Software
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
Computer Standards & Interfaces
Lightweight encryption for email
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
Domain-based administration of identity-based cryptosystems for secure email and IPSEC
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Addressing Credential Revocation in Grid Environments
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Malicious KGC attacks in certificateless cryptography
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Certificateless threshold cryptosystem secure against chosen-ciphertext attack
Information Sciences: an International Journal
Improved ID-based security framework for ad hoc network
Ad Hoc Networks
A secure incentive protocol for mobile ad hoc networks
Wireless Networks
Indentity-based broadcast signcryption
Computer Standards & Interfaces
Receipt management- transaction history based trust establishment
Proceedings of the 2007 ACM workshop on Digital identity management
What can identity-based cryptography offer to web services?
Proceedings of the 2007 ACM workshop on Secure web services
Cryptographic techniques for mobile ad-hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Attribute-based encryption with non-monotonic access structures
Proceedings of the 14th ACM conference on Computer and communications security
Alpaca: extensible authorization for distributed services
Proceedings of the 14th ACM conference on Computer and communications security
Provably secure ciphertext policy ABE
Proceedings of the 14th ACM conference on Computer and communications security
Certificateless undeniable signature scheme
Information Sciences: an International Journal
Identity-based ring signatures from RSA
Theoretical Computer Science
ID-based fair off-line electronic cash system with multiple banks
Journal of Computer Science and Technology
ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing
WI-IATW '07 Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
Computer Communications
Body sensor network security: an identity-based cryptography approach
WiSec '08 Proceedings of the first ACM conference on Wireless network security
An efficient scheme for secure group communication in mobile wireless sensor networks
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Security analysis of batch verification on identity-based signature schemes
ICCOMP'07 Proceedings of the 11th WSEAS International Conference on Computers
A tapestry of identity-based encryption: practical frameworks compared
International Journal of Applied Cryptography
The power of identification schemes
International Journal of Applied Cryptography
Aggregate designated verifier signatures and application to secure routing
International Journal of Security and Networks
On security proof of McCullagh Barreto's key agreement protocol and its variants
International Journal of Security and Networks
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
International Journal of Security and Networks
End-to-end security mechanisms for SMS
International Journal of Security and Networks
A mobile agent protected scheme using pairing-based cryptosystems
International Journal of Mobile Communications
A pairing-based authentication scheme for protecting multiple mobile agent hosts
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
An efficient and secure pairing-based fair blind signature scheme with message recovery
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
A New Practical Limited Identity-Based Encryption Scheme
Fundamenta Informaticae
Identity-based universal designated multi-verifiers signature schemes
Computer Standards & Interfaces
A systematic approach for cell-phone worm containment
Proceedings of the 17th international conference on World Wide Web
Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Security and privacy system architecture for an e-hospital environment
Proceedings of the 7th symposium on Identity and trust on the Internet
On the security of a digital signature with message recovery using self-certified public key
AMCOS'05 Proceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science
Lossy trapdoor functions and their applications
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
Trapdoors for hard lattices and new cryptographic constructions
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
A pairing SW implementation for Smart-Cards
Journal of Systems and Software
Improved certificate-based encryption in the standard model
Journal of Systems and Software
Information Sciences: an International Journal
ID-based one-pass authenticated key establishment
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Proceedings of the 5th international conference on Pervasive services
Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management
Information Systems Security
Notarized federated ID management and authentication
Journal of Computer Security - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'06)
An efficient session key generation for NTDR networks based on bilinear paring
Computer Communications
New Multiparty Signature Schemes for Network Routing Applications
ACM Transactions on Information and System Security (TISSEC)
Private Information: To Reveal or not to Reveal
ACM Transactions on Information and System Security (TISSEC)
A Secure IPv6-based Urban Wireless Mesh Network (SUMNv6)
Computer Communications
Designing a secure e-tender submission protocol
Electronic Commerce Research
Identity Based Multisignatures
Informatica
A New ID-Based Deniable Authentication Protocol
Informatica
Multi-domain lightpath authorization, using tokens
Future Generation Computer Systems
On the security of public key cryptosystems with a double decryption mechanism
Information Processing Letters
ID-Based (t,n) Threshold Proxy Signcryption for Multi-agent Systems
Computational Intelligence and Security
Identity-Based Key-Insulated Signature Without Random Oracles
Computational Intelligence and Security
Linkability Analysis of Some Blind Signature Schemes
Computational Intelligence and Security
An Efficient Anonymous Registration Scheme for Mobile IPv4
Computational Intelligence and Security
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature
Computational Intelligence and Security
Generalization of the Selective-ID Security Model for HIBS Protocols
Computational Intelligence and Security
General Ad Hoc Encryption from Exponent Inversion IBE
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Generic Transformation to Strongly Unforgeable Signatures
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
A More Natural Way to Construct Identity-Based Identification Schemes
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Certified E-Mail Protocol in the ID-Based Setting
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Efficient Certificateless Signature Schemes
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Self-certified Signatures Based on Discrete Logarithms
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility
Information Security and Cryptology
An Efficient ID-Based Proxy Signature Scheme from Pairings
Information Security and Cryptology
Multi-Identity Single-Key Decryption without Random Oracles
Information Security and Cryptology
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
A Trusted Group Signature Architecture in Virtual Computing Environment
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
RFID System Security Using Identity-Based Cryptography
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Delegating Capabilities in Predicate Encryption Systems
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
Bounded Ciphertext Policy Attribute Based Encryption
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree
ADMA '08 Proceedings of the 4th international conference on Advanced Data Mining and Applications
Identity-Based Online/Offline Encryption
Financial Cryptography and Data Security
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Secure Ubiquitous Health Monitoring System
NBiS '08 Proceedings of the 2nd international conference on Network-Based Information Systems
One-Round ID-Based Blind Signature Scheme without ROS Assumption
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Tracing Malicious Proxies in Proxy Re-encryption
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Certificate-Based Signature Schemes without Pairings or Random Oracles
ISC '08 Proceedings of the 11th international conference on Information Security
General Certificateless Encryption and Timed-Release Encryption
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Efficient Certificate-Based Encryption in the Standard Model
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
New Anonymity Notions for Identity-Based Encryption
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
An Identity-Based Key Agreement Protocol for the Network Layer
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
An one-way function based framework for pairwise key establishment in sensor networks
International Journal of Security and Networks
Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks
International Journal of Security and Networks
A new framework for the design and analysis of identity-based identification schemes
Theoretical Computer Science
Identity-based encryption with efficient revocation
Proceedings of the 15th ACM conference on Computer and communications security
Black-box accountable authority identity-based encryption
Proceedings of the 15th ACM conference on Computer and communications security
Identity-based constant round group key exchange protocol via secret-share
WSEAS TRANSACTIONS on SYSTEMS
On the relation among various security models for certificateless cryptography
International Journal of Applied Cryptography
An identity-based key infrastructure suitable for messaging and its application to e-mail
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Parameterized access control: from design to prototype
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A secure identity-based proxy multi-signature scheme
Information Sciences: an International Journal
Breaking the short certificateless signature scheme
Information Sciences: an International Journal
Efficient and provably-secure certificateless short signature scheme from bilinear pairings
Computer Standards & Interfaces
A privacy problem on Hu-Huang's proxy key generation protocol
Computer Standards & Interfaces
Constructing UC secure and constant-round group key exchange protocols via secret sharing
EURASIP Journal on Wireless Communications and Networking
A secure identity-based multi-proxy signature scheme
Computers and Electrical Engineering
A versatile Montgomery multiplier architecture with characteristic three support
Computers and Electrical Engineering
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
Entity Based Message Authentication System
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Chosen Ciphertext Secure Public Key Encryption with a Simple Structure
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model
Designs, Codes and Cryptography
Efficient and Short Certificateless Signature
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Generalized Identity Based and Broadcast Encryption Schemes
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Improved Certificateless Signature Scheme Secure in the Standard Model
Fundamenta Informaticae
On the Security of Beth's Identification Schemes against Active and Concurrent Adversaries
Mathematical Methods in Computer Science
ICAIT '08 Proceedings of the 2008 International Conference on Advanced Infocomm Technology
A secure identity-based threshold signature scheme from Tate pairings
ICAIT '08 Proceedings of the 2008 International Conference on Advanced Infocomm Technology
Certificate-based sequential aggregate signature
Proceedings of the second ACM conference on Wireless network security
RFID-based supply chain partner authentication and key agreement
Proceedings of the second ACM conference on Wireless network security
New Construction of Short Hierarchical ID-Based Signature in the Standard Model
Fundamenta Informaticae
Reporter node determination of replicated node detection in wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
A new certificateless aggregate signature scheme
Computer Communications
Design of DL-based certificateless digital signatures
Journal of Systems and Software
An identity based universal designated verifier signature scheme secure in the standard model
Journal of Systems and Software
Fully CCA2 secure identity based broadcast encryption without random oracles
Information Processing Letters
Efficient Identity-Based Encryption with Tight Security Reduction
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Universally Composable Identity-Based Encryption
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Efficient Fair Exchange from Identity-Based Signature
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Identity-Based Encryptions with Tight Security Reductions to the BDH Problem
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Random Visitor: Defense against Identity Attacks in P2P Networks
IEICE - Transactions on Information and Systems
Designs, Codes and Cryptography
Information Security Applications
Hierarchical Identity Based Encryption with Polynomially Many Levels
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
Predicate Privacy in Encryption Systems
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
Blind signature and ring signature schemes: Rehabilitation and attack
Computer Standards & Interfaces
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Removing Escrow from Identity-Based Encryption
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption
Information Security and Cryptology --- ICISC 2008
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions
Information Security and Cryptology --- ICISC 2008
A generic construction of useful client puzzles
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Universal forgery of the identity-based sequential aggregate signature scheme
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Delegate predicate encryption and its application to anonymous authentication
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
RSA-Based Certificateless Public Key Encryption
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Strongly Unforgeable ID-Based Signatures without Random Oracles
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Certificateless Hybrid Signcryption
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Verifiable Random Functions from Identity-Based Key Encapsulation
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Efficient self-certified proxy CAE scheme and its variants
Journal of Systems and Software
On cryptography with auxiliary input
Proceedings of the forty-first annual ACM symposium on Theory of computing
Adaptive-ID Secure Revocable Identity-Based Encryption
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Universally Anonymous IBE Based on the Quadratic Residuosity Assumption
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Cryptanalysis of Two Ring Signcryption Schemes
Information Security and Cryptology
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model
Information Security and Cryptology
Further Observations on Certificateless Public Key Encryption
Information Security and Cryptology
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks
Information Security and Cryptology
A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme
Information Security and Cryptology
Inter-domain Identity-Based Proxy Re-encryption
Information Security and Cryptology
Efficient ID-based multi-decrypter encryption with short ciphertexts
Journal of Computer Science and Technology
Inter-cluster routing authentication for ad hoc networks by a hierarchical key scheme
Journal of Computer Science and Technology
Proceedings of the 4th Annual International Conference on Wireless Internet
New Anonymity Notions for Identity-Based Encryption
Formal to Practical Security
An Efficient Identity-Based Online/Offline Encryption Scheme
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle
ISNN 2009 Proceedings of the 6th International Symposium on Neural Networks: Advances in Neural Networks - Part III
An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Message authentication for wireless sensor networks
CIS'09 Proceedings of the international conference on Computational and information science 2009
An escrow-less identity-based group-key agreement protocol for dynamic peer groups
International Journal of Security and Networks
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
On Distributed k-Anonymization
Fundamenta Informaticae
A Schnorr-Like Lightweight Identity-Based Signature Scheme
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Certified Encryption Revisited
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Building Key-Private Public-Key Encryption Schemes
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Secured communication protocol for internetworking ZigBee cluster networks
Computer Communications
Towards compromise-resilient localized authentication architecture for wireless mesh networks
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings
UIC '09 Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing
A study on authentication/authorization/accounting and roaming mechanism in pervasive environment
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
Two improved two-party identity-based authenticated key agreement protocols
Computer Standards & Interfaces
An efficient and provable secure identity-based ring signcryption scheme
Computer Standards & Interfaces
Authorisation infrastructure for on-demand network resource provisioning
GRID '08 Proceedings of the 2008 9th IEEE/ACM International Conference on Grid Computing
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks
Computer Communications
JXTA resource access control by means of advertisement encryption
Future Generation Computer Systems
Towards a Lightweight Security Solution for User-Friendly Management of Distributed Sensor Networks
NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces
Generic Construction of Stateful Identity Based Encryption
ISC '09 Proceedings of the 12th International Conference on Information Security
Security of self-certified signatures
Information Processing Letters
Identity Based Group Signatures from Hierarchical Identity-Based Encryption
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
TrueIP: prevention of IP spoofing attacks using identity-based cryptography
Proceedings of the 2nd international conference on Security of information and networks
An on-demand key establishment protocol for MANETs
International Journal of Wireless and Mobile Computing
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
Theoretical Computer Science
An efficient secure proxy verifiably encrypted signature scheme
Journal of Network and Computer Applications
Efficient message authentication protocol for WSN
WSEAS Transactions on Computers
An ID-based multisignature scheme without reblocking and predetermined signing order
Computer Standards & Interfaces
An efficient authentication scheme for access control in mobile pay-TV systems
IEEE Transactions on Multimedia
Improving privacy and security in multi-authority attribute-based encryption
Proceedings of the 16th ACM conference on Computer and communications security
Proceedings of the 16th ACM conference on Computer and communications security
Patient controlled encryption: ensuring privacy of electronic medical records
Proceedings of the 2009 ACM workshop on Cloud computing security
A simple construction for public-key encryption with revocable anonymity: the honest-sender case
Proceedings of the nineth ACM workshop on Digital rights management
Certificateless signcryption scheme in the standard model
Information Sciences: an International Journal
Identity-based secure protocol scheme for wireless sensor network
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles
Journal of Systems and Software
DoS-resistant ID-based password authentication scheme using smart cards
Journal of Systems and Software
Identity-based threshold cryptography for electronic voting
DNCOCO'09 Proceedings of the 8th WSEAS international conference on Data networks, communications, computers
Securing resource-constrained wireless ad hoc networks
IEEE Wireless Communications
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
International Journal of Security and Networks
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
Efficient and Provably Secure Self-certified Signature Scheme
AMT '09 Proceedings of the 5th International Conference on Active Media Technology
Spatial Encryption under Simpler Assumption
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Identity-Based Verifiably Encrypted Signatures without Random Oracles
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Server-Controlled Identity-Based Authenticated Key Exchange
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Distributing the Key Distribution Centre in Sakai---Kasahara Based Systems
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Certificate-Free Attribute Authentication
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Identity Based Aggregate Signcryption Schemes
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles
Information Security Applications
ID-Based Adaptive Oblivious Transfer
Information Security Applications
Simulatable certificateless two-party authenticated key agreement protocol
Information Sciences: an International Journal
A security framework with strong non-repudiation and privacy in VANETs
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
An authenticated self-healing key distribution scheme based on bilinear pairings
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
SeGCom: secure group communication in VANETs
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
EURASIP Journal on Wireless Communications and Networking
Provably secure non-interactive key distribution based on pairings
Discrete Applied Mathematics - Special issue: Coding and cryptography
Refinements of Miller's algorithm for computing the Weil/Tate pairing
Journal of Algorithms
Efficient hybrid encryption from ID-based encryption
Designs, Codes and Cryptography
Review: Wireless sensor network key management survey and taxonomy
Journal of Network and Computer Applications
On the security of some multi-PKG/multi-recipient signcryption schemes
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
A pairing-based signcryption scheme using self-certified public keys
International Journal of Computers and Applications
An identity-based access authentication scheme for heterogeneous wireless network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks
IEEE Transactions on Wireless Communications
A key management scheme for ad hoc networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
An efficient identity-based group key agreement protocol
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A wireless mesh network authentication method based on identity based signature
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
An efficient broadcast encryption scheme for wireless sensor network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A security architecture for wireless sensor networks based-on public key cryptography
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A fast-roaming authentication method using ID-based encryption for the 3G user roaming between WLANs
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A certificateless-based Key distribution scheme with multi-KGCs in P2P networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Identity-based authentication protocol with paring of tate on WSN
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Identity-based uploading content scheme in DRM
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
International Journal of Security and Networks
Hidden attribute-based signatures without anonymity revocation
Information Sciences: an International Journal
Proceedings of the 9th Symposium on Identity and Trust on the Internet
Efficient certificate-based signcryption scheme from bilinear pairings
International Journal of Computers and Applications
A formal approach to security architectures
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
ESIGN: an efficient digital signature implementation for smart cards
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Non-interactive public-key cryptography
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Attribute-based signature and its applications
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Identity-based encryption based on DHIES
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Practical ID-based encryption for wireless sensor network
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
A secure mobile agent system using multi-signature scheme in electronic commerce
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
Certificate based (linkable) ring signature
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
An efficient ID-based verifiably encrypted signature scheme based on Hess's scheme
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Identity-based threshold decryption revisited
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Efficient ID-based blind signature and proxy signature from bilinear pairings
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Separating encryption and key issuance in digital rights management systems
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Parallel key-insulated public key encryption without random oracles
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Identity-based traitor tracing
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
A closer look at PKI: security and efficiency
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Self-generated-certificate public key encryption without pairing
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Multi-authority attribute based encryption
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Linkability of some blind signature schemes
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Cryptanalysis of some proxy signature schemes without certificates
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Identity-based key issuing without secure channel in a broad area
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Random visitor: a defense against identity attacks in P2P overlay networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Timed release of standard digital signatures
FC'02 Proceedings of the 6th international conference on Financial cryptography
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Certificate-based encryption and the certificate revocation problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Two birds one stone: signcryption using RSA
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Protecting against key escrow and key exposure in identity-based cryptosystem
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
Generic certificateless key encapsulation mechanism
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Efficient chosen-ciphertext secure identity-based encryption with wildcards
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Certificateless signature revisited
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Infringing key authentication of an ID-based group key exchange protocol using binary key trees
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part I
Secure threshold multi authority attribute based encryption without a central authority
Information Sciences: an International Journal
An improved semantically-secure identity-based signcryption scheme in the standard model
Computers and Electrical Engineering
A group-based security policy for wireless sensor networks
Proceedings of the 2010 ACM Symposium on Applied Computing
Reducing trust in the PKG in identity based cryptosystems
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Proxy re-signature schemes without random oracles
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Public key encryption with searchable keywords based on Jacobi symbols
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Mutative identity-based signatures or dynamic credentials without random oracles
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
Efficient ID-based digital signatures with message recovery
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
Generic combination of public key encryption with keyword search and public key encryption
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
Strongly secure certificateless public key encryption without pairing
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
Generic certificateless encryption in the standard model
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
A secure intra-domain routing protocol for wireless mesh networks
ICISS'07 Proceedings of the 3rd international conference on Information systems security
CCA2-secure threshold broadcast encryption with shorter ciphertexts
ProvSec'07 Proceedings of the 1st international conference on Provable security
Construction of a hybrid HIBE protocol secure against adaptive attacks: without random oracle
ProvSec'07 Proceedings of the 1st international conference on Provable security
Two notes on the security of certificateless signatures
ProvSec'07 Proceedings of the 1st international conference on Provable security
A provably secure ring signature scheme in certificateless cryptography
ProvSec'07 Proceedings of the 1st international conference on Provable security
Formal security treatments for signatures from identity-based encryption
ProvSec'07 Proceedings of the 1st international conference on Provable security
Decryptable searchable encryption
ProvSec'07 Proceedings of the 1st international conference on Provable security
ID-based key agreement with anonymity for ad hoc networks
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
Self-authorized public key management for home networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
New efficient certificateless signature scheme
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A practical identity-based signature scheme from bilinear map
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Identity-based broadcast encryption with constant size ciphertexts and private keys
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Blind identity-based encryption and simulatable oblivious transfer
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Multi-key hierarchical identity-based signatures
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Certificateless authenticated two-party key agreement protocols
ASIAN'06 Proceedings of the 11th Asian computing science conference on Advances in computer science: secure software and related issues
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Convertible undeniable proxy signatures: security models and efficient construction
WISA'07 Proceedings of the 8th international conference on Information security applications
Hidden identity-based signatures
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Predicate encryption supporting disjunctions, polynomial equations, and inner products
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Traceable and retrievable identity-based encryption
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Identity-based threshold key-insulated encryption without random oracles
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
CCA2 secure IBE: standard model efficiency through authenticated symmetric encryption
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Public key encryption with keyword search based on K-resilient IBE
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Proxy signatures secure against proxy key exposure
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Unidirectional chosen-ciphertext secure proxy re-encryption
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
An interpretation of identity-based cryptography
Foundations of security analysis and design IV
A note on information-theoretic secret key exchange over wireless channels
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
User-friendly grid security architecture and protocols
Proceedings of the 13th international conference on Security protocols
An efficient identity-based ring signature scheme and its extension
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Changes of cyber-terrorism: autonomous terrors and counter-measures
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Integrating identity based cryptography with cryptographically generated addresses in mobile IPv6
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Flexible authentication in vehicular ad hoc networks
APCC'09 Proceedings of the 15th Asia-Pacific conference on Communications
A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
Information Sciences: an International Journal
VisualSec: a secure message delivery scheme for online social networks based on profile images
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Accountable file indexing against DDoS attacks in peer-to-peer networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Secure communication among cell phones and sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Private key agreement and secure communication for heterogeneous sensor networks
Journal of Parallel and Distributed Computing
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Universal authentication protocols for anonymous wireless communications
IEEE Transactions on Wireless Communications
Finite field arithmetic for cryptography
IEEE Circuits and Systems Magazine
Providing basic security mechanisms in broker-less publish/subscribe systems
Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems
How to secure multi-domain wireless mesh networks
Wireless Networks
Strongly unforgeable ID-based signatures without random oracles
International Journal of Applied Cryptography
Constructions of certificate-based signature secure against key replacement attacks
Journal of Computer Security - The 2007 European PKI Workshop: Theory and Practice (EuroPKI'07)
An efficient signcryption scheme with key privacy and its extension to ring signcryption
Journal of Computer Security - The 2007 European PKI Workshop: Theory and Practice (EuroPKI'07)
The brighter side of risks in peer-to-peer barter relationships
Future Generation Computer Systems
Secure attribute-based systems
Journal of Computer Security
Provable secure identity based generalized signcryption scheme
Theoretical Computer Science
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing
Identity based threshold cryptography and blind signatures for electronic voting
WSEAS Transactions on Computers
An ID-based aggregate signature scheme with constant pairing computations
Journal of Systems and Software
Efficient many-to-one authentication with certificateless aggregate signatures
Computer Networks: The International Journal of Computer and Telecommunications Networking
Energy-efficient key distribution and revocation in tactical networks with asymmetric links
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Flexible key exchange negotiation for wireless sensor networks
Proceedings of the fifth ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
Biometrics for Electronic Health Records
Journal of Medical Systems
Authentication and ID-Based Key Management Protocol in Pervasive Environment
Wireless Personal Communications: An International Journal
Synthesis-for-testability watermarking for field authenticatioil of VLSI intellectual property
IEEE Transactions on Circuits and Systems Part I: Regular Papers
Certificateless threshold signature scheme from bilinear maps
Information Sciences: an International Journal
Practical leakage-resilient identity-based encryption from simple assumptions
Proceedings of the 17th ACM conference on Computer and communications security
New construction of identity-based proxy re-encryption
Proceedings of the tenth annual ACM workshop on Digital rights management
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Securing wireless sensor networks: an identity-based cryptography approach
International Journal of Sensor Networks
Post-quantum cryptography: code-based signatures
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Towards privacy-enhancing identity management in mashup-providing platforms
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Two robust remote user authentication protocols using smart cards
Journal of Systems and Software
Efficient completely non-malleable public key encryption
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming
Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Broadcast encryption with multiple trust authorities
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
Adaptively secure identity-based identification from lattices without random oracles
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Distributed private-key generators for identity-based cryptography
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Identity-based authenticated asymmetric group key agreement protocol
COCOON'10 Proceedings of the 16th annual international conference on Computing and combinatorics
A mutual-healing key distribution scheme in wireless sensor networks
Journal of Network and Computer Applications
A novel node level security policy framework for wireless sensor networks
Journal of Network and Computer Applications
Information Sciences: an International Journal
Forward-secure identity-based signature: Security notions and construction
Information Sciences: an International Journal
Identity-based strong designated verifier signature revisited
Journal of Systems and Software
Okamoto-Tanaka revisited: fully authenticated diffie-hellman with minimal overhead
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Identity based encryption: Progress and challenges
Information Security Tech. Report
E-passport EAC scheme based on Identity-Based Cryptography
Information Processing Letters
Securing cluster-based ad hoc networks with distributed authorities
IEEE Transactions on Wireless Communications
Identity-based chameleon hash scheme without key exposure
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
ID-based authenticated multi-group keys agreement scheme for computing grid
AICI'10 Proceedings of the 2010 international conference on Artificial intelligence and computational intelligence: Part II
A brief introduction to certificateless encryption schemes and their infrastructures
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Timed-ephemerizer: make assured data appear and disappear
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
How to construct identity-based signatures without the key escrow problem
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity
ProvSec'10 Proceedings of the 4th international conference on Provable security
Identity based public verifiable signcryption scheme
ProvSec'10 Proceedings of the 4th international conference on Provable security
A note on an identity-based ring signature scheme with signer verifiability
Theoretical Computer Science
Certificateless public key encryption: A new generic construction and two pairing-free schemes
Theoretical Computer Science
An AAA scheme using ID-based ticket with anonymity in future mobile communication
Computer Communications
Certificateless multi-proxy signature
Computer Communications
Attribute-based authentication for multi-agent systems with dynamic groups
Computer Communications
Efficient and short certificateless signatures secure against realistic adversaries
The Journal of Supercomputing
Admissible bilinear map-based key management protocol for HPCCS in heterogeneous network
The Journal of Supercomputing
Principles, Systems and Applications of IP Telecommunications
A privacy-preserving ID-based group key agreement scheme applied in VPAN
SOFSEM'11 Proceedings of the 37th international conference on Current trends in theory and practice of computer science
New constructions for identity-based unidirectional proxy re-encryption
Journal of Computer Science and Technology
Journal of Computer Science and Technology
Identity-based proxy cryptosystems with revocability and hierarchical confidentialities
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Anonymizable signature and its construction from pairings
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Constructing certificateless encryption and ID-based encryption from ID-based key agreement
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Generating more Kawazoe-Takahashi genus 2 pairing-friendly hyperelliptic curves
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
New identity-based proxy re-encryption schemes to prevent collusion attacks
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Construction of identity based signcryption schemes
WISA'10 Proceedings of the 11th international conference on Information security applications
Round-optimal deniable ring authentication in the presence of big brother
WISA'10 Proceedings of the 11th international conference on Information security applications
ID-based multi-proxy multi-signature scheme from bilinear pairing
AMERICAN-MATH'11/CEA'11 Proceedings of the 2011 American conference on applied mathematics and the 5th WSEAS international conference on Computer engineering and applications
Network trust management in emergency situations
Journal of Computer and System Sciences
Key updating technique in identity-based encryption
Information Sciences: an International Journal
Self-generated-certificate public key encryption without pairing and its application
Information Sciences: an International Journal
A new provably secure certificateless short signature scheme
Computers & Mathematics with Applications
Relations between semantic security and anonymity in identity-based encryption
Information Processing Letters
Cryptanalysis of an identity based broadcast encryption scheme without random oracles
Information Processing Letters
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Homomorphic network coding signatures in the standard model
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Efficient attribute-based signatures for non-monotone predicates in the standard model
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Expressive key-policy attribute-based encryption with constant-size ciphertexts
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Fully secure accountable-authority identity-based encryption
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Biometric cards with advanced signing system
International Journal of Biometrics
An ID-based multi-signer universal designated multi-verifier signature scheme
Information and Computation
Strongly secure identity-based authenticated key agreement protocols
Computers and Electrical Engineering
Enhanced short signature scheme with hybrid problems
Computers and Electrical Engineering
Enhanced Certificate-Based Encryption from pairings
Computers and Electrical Engineering
On the security of an identity based multi-proxy signature scheme
Computers and Electrical Engineering
Efficient identity-based authenticated multiple key exchange protocol
Computers and Electrical Engineering
Security design for an inter-domain publish/subscribe architecture
The future internet
Identity-based key exchange protocols without pairings
Transactions on computational science X
A novel identity-based key issuing scheme based on interacting neural network
ISNN'05 Proceedings of the Second international conference on Advances in neural networks - Volume Part II
Functional encryption: definitions and challenges
TCC'11 Proceedings of the 8th conference on Theory of cryptography
A correlation power analysis attack against tate pairing on FPGA
ARC'11 Proceedings of the 7th international conference on Reconfigurable computing: architectures, tools and applications
Group-oriented fair exchange of signatures
Information Sciences: an International Journal
Security weaknesses of authenticated key agreement protocols
Information Processing Letters
Generic transformation from weakly to strongly unforgeable signatures
Journal of Computer Science and Technology
Forgeability of Wang-Tang-Li's ID-based restrictive partially blind signature scheme
Journal of Computer Science and Technology
A traceable certificateless threshold proxy signature scheme from bilinear pairings
APWeb'11 Proceedings of the 13th Asia-Pacific web conference on Web technologies and applications
Proceedings of the fourth ACM conference on Wireless network security
Secure and highly efficient three level key management scheme for MANET
WSEAS Transactions on Computers
Securely disseminating RFID events
Proceedings of the 5th ACM international conference on Distributed event-based system
An efficient identity-based blind signature scheme without bilinear pairings
Computers and Electrical Engineering
An ID-based digital watermarking protocol for copyright protection
Computers and Electrical Engineering
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
Information Sciences: an International Journal
Unbounded HIBE and attribute-based encryption
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Decentralizing attribute-based encryption
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
New fully secure hierarchical identity-based encryption with constant size ciphertexts
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
New identity-based key-insulated convertible multi-authenticated encryption scheme
Journal of Network and Computer Applications
Affiliation-hiding authentication with minimal bandwidth consumption
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Authenticated Byzantine generals in dual failure model
ICDCN'10 Proceedings of the 11th international conference on Distributed computing and networking
An approach for adapting moodle into a secure infrastructure
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Fully non-interactive onion routing with forward-secrecy
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Adaptively secure non-interactive threshold cryptosystems
ICALP'11 Proceedings of the 38th international conference on Automata, languages and programming - Volume Part II
SEC'11 Proceedings of the 20th USENIX conference on Security
Identity-based server-aided decryption
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Journal of Network and Computer Applications
Online/offline identity-based signcryption revisited
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Acquiring key privacy from data privacy
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Improved access control mechanism in vehicular ad hoc networks
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
Publicly posted composite documents with identity based encryption
Proceedings of the 11th ACM symposium on Document engineering
E-voting: a new approach using double-blind identity-based encryption
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Attribute based signatures for bounded multi-level threshold circuits
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Hierarchical-CPK-based trusted computing cryptography scheme
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
Context-based security: state of the art, open research topics and a case study
CASEMANS '11 Proceedings of the 5th ACM International Workshop on Context-Awareness for Self-Managing Systems
An efficient identity based generalized signcryption scheme
Theoretical Computer Science
Mobile agent code updating and authentication protocol for code-centric RFID system
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Verifiable security of Boneh-Franklin identity-based encryption
ProvSec'11 Proceedings of the 5th international conference on Provable security
Efficient identity-based signcryption in the standard model
ProvSec'11 Proceedings of the 5th international conference on Provable security
Identity-based trace and revoke schemes
ProvSec'11 Proceedings of the 5th international conference on Provable security
Generalized learning problems and applications to non-commutative cryptography
ProvSec'11 Proceedings of the 5th international conference on Provable security
APPA: aggregate privacy-preserving authentication in vehicular Ad Hoc networks
ISC'11 Proceedings of the 14th international conference on Information security
Delegation of signing rights using certificateless proxy signatures
Information Sciences: an International Journal
Access policy based key management in multi-level multi-distributor DRM architecture
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
An ID-based proxy multi signature scheme without bilinear pairings
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
ID-based proxy signature scheme with message recovery
Journal of Systems and Software
A round-optimal three-party ID-based authenticated key agreement protocol
Information Sciences: an International Journal
Identity-based deterministic signature scheme without forking-lemma
IWSEC'11 Proceedings of the 6th International conference on Advances in information and computer security
A variant of Boyen-waters anonymous IBE scheme
ICICS'11 Proceedings of the 13th international conference on Information and communications security
A unified security framework for multi-domain wireless mesh networks
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Identity-based online/offline signcryption for low power devices
Journal of Network and Computer Applications
An improved two-party identity-based authenticated key agreement protocol using pairings
Journal of Computer and System Sciences
HIBE with short public parameters without random oracle
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
On the generic construction of identity-based signatures with additional properties
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Cryptanalysis of two signature schemes based on bilinear pairings in CISC '05
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Identity-based key-insulated signature with secure key-updates
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Efficient intrusion-resilient signatures without random oracles
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Deniable authenticated key establishment for internet protocols
Proceedings of the 11th international conference on Security Protocols
On pairing-based cryptosystems
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Universally composable identity-based encryption
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Constant-size ID-based linkable and revocable-iff-linked ring signature
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Secure cryptographic workflow in the standard model
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Multi-receiver identity-based key encapsulation with shortened ciphertext
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Identity-based key distribution for mobile Ad Hoc networks
Frontiers of Computer Science in China
An efficient short certificate-based signature scheme
Journal of Systems and Software
Improving the ID-Based key exchange protocol in wireless mobile ad hoc networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Notarized federated identity management for web services
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
On broadcast authentication in wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
An identity-based proxy signature scheme from pairings
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Point-based trust: define how much privacy is worth
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Cryptanalysis of ID-based authenticated key agreement protocols from bilinear pairings (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Identity-Based encryption gone wild
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
The application of collaborative filtering for trust management in p2p communities
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
A novel ID-Based partial delegation with warrant proxy signature scheme
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Security of an efficient ID-Based authenticated key agreement protocol from pairings
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
ID-Based proxy signature using bilinear pairings
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
A grid authentication system with revocation guarantees
HiPC'05 Proceedings of the 12th international conference on High Performance Computing
Identity-Based hierarchical strongly key-insulated encryption and its application
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Identity based delegation network
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Security of two-party identity-based key agreement
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
ID-based restrictive partially blind signatures
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
An ID-based optimistic fair signature exchange protocol from pairings
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Certificateless threshold signature schemes
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
An efficient certificateless signature scheme
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
ID-based restrictive partially blind signatures
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
An identity-based threshold signcryption scheme with semantic security
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Secure delegation-by-warrant ID-based proxy signcryption scheme
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Universal designated-verifier proxy blind signatures for e-commerce
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Cryptography based on bilinear maps
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Applying fujisaki-okamoto to identity-based encryption
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Boneh-Franklin identity based encryption revisited
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Implementing cryptographic pairings on smartcards
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Identity-based partial message recovery signatures (or how to shorten ID-Based signatures)
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Policy-based cryptography and applications
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Two improved partially blind signature schemes from bilinear pairings
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Group signature where group manager, members and open authority are identity-based
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
ID-based authenticated key agreement for low-power mobile devices
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Separable identity-based deniable authentication: cryptographic primitive for fighting phishing
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Efficient certificateless proxy signature scheme with provable security
Information Sciences: an International Journal
Adaptable designated group signature
ICIC'06 Proceedings of the 2006 international conference on Intelligent Computing - Volume Part I
On email spamming under the shadow of large scale use of identity-based encryption
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Constructing fair-exchange p2p file market
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
Reconsideration on the security of the boneh-franklin identity-based encryption scheme
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
On the security of certificateless signature schemes from asiacrypt 2003
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
ID-Based aggregate signatures from bilinear pairings
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Efficient identity-based signatures and blind signatures
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Two proxy signcryption schemes from bilinear pairings
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Efficient identity-based protocol for fair certified e-mail delivery
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Improvements on security proofs of some identity based encryption schemes
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
An ID-Based verifiable encrypted signature scheme based on hess’s scheme
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
ID-Based signature scheme without trusted PKG
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
ID-Based threshold unsigncryption scheme from pairings
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Improvement of an efficient user identification scheme based on ID-Based cryptosystem
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Identity-Based universal designated verifier signatures
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
ID-Based access control and authority delegations
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Identity-Based threshold proxy signature scheme with known signers
TAMC'06 Proceedings of the Third international conference on Theory and Applications of Models of Computation
Security analysis and improvement for key issuing schemes in ID-Based cryptography
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
An efficient certificateless signature scheme
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
An identity-based signcryption scheme with short ciphertext from pairings
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
A strong identity based key-insulated cryptosystem
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
A new hierarchical ID-Based cryptosystem and CCA-Secure PKE
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
New techniques for dual system encryption and fully secure HIBE with short ciphertexts
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
Java implementation for pairing-based cryptosystems
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
Secure and efficient ID-based group key agreement fitted for Pay-TV
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
Efficient public key broadcast encryption using identifier of receivers
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Identity-based key agreement with unilateral identity privacy using pairings
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Identity based key insulated signature
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Linkability of a blind signature scheme and its improved scheme
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Improved identity-based signcryption
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
CBE from CL-PKE: a generic construction and efficient schemes
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Attribute-based encryption schemes with constant-size ciphertexts
Theoretical Computer Science
Identity based encryption without redundancy
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Cryptosystems based on elliptic curve pairing
MDAI'05 Proceedings of the Second international conference on Modeling Decisions for Artificial Intelligence
One-Way and two-party authenticated ID-Based key agreement protocols using pairing
MDAI'05 Proceedings of the Second international conference on Modeling Decisions for Artificial Intelligence
Identity based conference key distribution scheme from parings
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Secure group instant messaging using cryptographic primitives
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Provable security of ID-Based proxy signature schemes
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
A new two-party identity-based authenticated key agreement
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Accumulators from bilinear pairings and applications
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Fast and proven secure blind identity-based signcryption from pairings
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
An efficient and divisible payment scheme for m-commerce
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Verifiable pairing and its applications
WISA'04 Proceedings of the 5th international conference on Information Security Applications
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
An efficient RSA-based certificateless signature scheme
Journal of Systems and Software
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority
Journal of Systems and Software
Peer collaboration in wireless ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part II
Interoperation between a conventional PKI and an ID-Based infrastructure
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Identity based ring signature: why, how and what next
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
An identity-based model for grid security infrastructure
ISSADS'05 Proceedings of the 5th international conference on Advanced Distributed Systems
Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
An identity-based grid security infrastructure model
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
A dynamic key infrastructure for GRID
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
Efficient identity-based encryption without random oracles
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Hierarchical identity based encryption with constant size ciphertext
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Hardware acceleration of the tate pairing in characteristic three
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Time-based release of confidential information in hierarchical settings
ISC'05 Proceedings of the 8th international conference on Information Security
Certificateless public key encryption without pairing
ISC'05 Proceedings of the 8th international conference on Information Security
Ring signature schemes for general ad-hoc access structures
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
New ID-Based threshold signature scheme from bilinear pairings
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Separable implicit certificate revocation
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Identity based threshold ring signature
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Batch verifications with ID-Based signatures
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Further improvement of an identity-based signcryption scheme in the standard model
Computers and Electrical Engineering
Efficient ID-Based optimistic fair exchange with provable security
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Enhanced ID-Based authenticated key agreement protocols for a multiple independent PKG environment
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Poster abstract: security in commercial applications of vehicular ad-hoc networks
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Constant size ciphertexts in threshold attribute-based encryption
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
Identity-Based aggregate and multi-signature schemes based on RSA
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Bonsai trees, or how to delegate a lattice basis
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Efficient lattice (H)IBE in the standard model
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Constructing verifiable random functions with large input spaces
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Fuzzy biometric signcryption scheme with bilinear pairings in the standard model
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
Towards confidentiality of ID-Based signcryption schemes under without random oracle model
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
Privacy in encrypted content distribution using private broadcast encryption
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Pairing based threshold cryptography improving on libert-quisquater and baek-zheng
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Chosen-ciphertext secure threshold identity-based key encapsulation without random oracles
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Lightweight email signatures (extended abstract)
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Anonymous hierarchical identity-based encryption (without random oracles)
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
How to leak a secret: theory and applications of ring signatures
Theoretical Computer Science
Parallel key-insulated public key encryption
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Generalization of the Selective-ID security model for HIBE protocols
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Identity-Based aggregate signatures
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
The power of identification schemes
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
On constructing certificateless cryptosystems from identity based encryption
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Security-Mediated certificateless cryptography
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Public key encryption with keyword search based on k-resilient IBE
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
A separation between selective and full-identity security notions for identity-based encryption
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Certificateless public-key signature: security model and efficient construction
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Practical identity-based encryption without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Efficient identity-based signatures secure in the standard model
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Event-oriented k-times revocable-iff-linked group signatures
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Key replacement attack against a generic construction of certificateless signature
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
ID-Based ring signature scheme secure in the standard model
IWSEC'06 Proceedings of the 1st international conference on Security
New constructions of constant size ciphertext HIBE without random oracle
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Efficient identity-based encryption with tight security reduction
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Authenticated and communication efficient group key agreement for clustered ad hoc networks
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Efficient ID-Based one-time proxy signature and its application in e-cheque
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Cryptographic protocol to establish trusted history of interactions
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Identity-Based multi-signatures from RSA
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Refinement of miller's algorithm over edwards curves
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Anonymity from asymmetry: new constructions for anonymous HIBE
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Making the diffie-hellman protocol identity-based
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
SocialClouds: concept, security architecture and some mechanisms
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Secure communication using identity based encryption
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Identity-Based key agreement protocols in a multiple PKG environment
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
Identity-Based aggregate and verifiably encrypted signatures from bilinear pairing
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
Security proof of sakai-kasahara's identity-based encryption scheme
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
How to solve key escrow and identity revocation in identity-based encryption schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
Location privacy for cellular systems; analysis and solution
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Privacy issues in vehicular ad hoc networks
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Relations among notions of security for identity based encryption schemes
LATIN'06 Proceedings of the 7th Latin American conference on Theoretical Informatics
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Multi-receiver identity-based signcryption scheme in the standard model
ICICA'11 Proceedings of the Second international conference on Information Computing and Applications
A variant of schnorr identity-based identification scheme with tight reduction
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
Strongly secure certificateless short signatures
Journal of Systems and Software
Identity-Based signcryption from identity-based cryptography
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Application authentication for hybrid services of broadcasting and communications networks
WISA'11 Proceedings of the 12th international conference on Information Security Applications
A novel commutative blinding identity based encryption scheme
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Generic construction of designated tester public-key encryption with keyword search
Information Sciences: an International Journal
An efficient security framework for mobile WiMAX
Proceedings of the 27th Annual ACM Symposium on Applied Computing
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
On black-box reductions between predicate encryption schemes
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
Bounded-Collusion IBE from key homomorphism
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
A shared-secret free security infrastructure for wireless networks
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
One-round identity-based key exchange with Perfect Forward Security
Information Processing Letters
Research notes: Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem
Computer Communications
Research: Remote login authentication scheme based on a geometric approach
Computer Communications
I: Basic technologies: Modern key agreement techniques
Computer Communications
Research note: Key authentication scheme for cryptosystems based on discrete logarithms
Computer Communications
Research note: ID-based group-oriented cryptosystem and its digital signature scheme
Computer Communications
Research note: Three ID-based information security functions
Computer Communications
Research note: Authenticity of public keys in asymmetric cryptosystems
Computer Communications
Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Identity-Based (lossy) trapdoor functions and applications
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Tools for simulating features of composite order bilinear groups in the prime order setting
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Research note: Cryptanalysis of Lee and Chang's ID-based information security functions
Computer Communications
Privacy-preserving network flow recording
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Algebraic curves and cryptography
Finite Fields and Their Applications
A biometric identity-based signcryption scheme
Future Generation Computer Systems
A pairing-free certificateless authenticated key agreement protocol
International Journal of Communication Systems
A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks
Wireless Communications & Mobile Computing
Securing wireless mesh networks in a unified security framework with corruption-resilience
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
An ID-based cryptographic mechanisms based on GDLP and IFP
Information Processing Letters
Lossy Trapdoor Functions and Their Applications
SIAM Journal on Computing
Feasibility of position-based multivariate cryptosystems for WSN
International Journal of Internet Technology and Secured Transactions
Outsider-Anonymous broadcast encryption with sublinear ciphertexts
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Variants of waters' dual system primitives using asymmetric pairings
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
From selective to full security: semi-generic transformations in the standard model
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Circular and KDM security for identity-based encryption
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Certificateless strong designated verifier multisignature scheme using bilinear pairings
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Cryptanalysis of an Identity Based Signcryption without Random Oracles
Fundamenta Informaticae
RIKE: using revocable identities to support key escrow in PKIs
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Security enhancements by OR-proof in identity-based identification
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Identity-based extractable hash proofs and their applications
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Inner-product lossy trapdoor functions and applications
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Deterministic identity based signature scheme and its application for aggregate signatures
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Threshold ciphertext policy attribute-based encryption with constant size ciphertexts
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Fully private revocable predicate encryption
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Revocable identity-based encryption from lattices
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model
Fundamenta Informaticae
Forward-Secure Identity-Based Public-Key Encryption without Random Oracles
Fundamenta Informaticae
Security Pitfalls of the Certificateless Signature and Multi-Receiver Signcryption Schemes
Fundamenta Informaticae
New Construction of Short Hierarchical ID-Based Signature in the Standard Model
Fundamenta Informaticae
On Distributed k-Anonymization
Fundamenta Informaticae
A performance analysis of identity-based encryption schemes
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Fully secure unidirectional identity-based proxy re-encryption
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
An efficient certificateless two-party authenticated key agreement protocol
Computers & Mathematics with Applications
Certificate-based signcryption with enhanced security features
Computers & Mathematics with Applications
An Improved Certificateless Signature Scheme Secure in the Standard Model
Fundamenta Informaticae
Functional encryption: a new vision for public-key cryptography
Communications of the ACM
A New Practical Limited Identity-Based Encryption Scheme
Fundamenta Informaticae
Proceedings of the 2012 ACM conference on Computer and communications security
A Privacy-Strengthened Scheme for E-Healthcare Monitoring System
Journal of Medical Systems
Secure Dynamic Access Control Scheme of PHR in Cloud Computing
Journal of Medical Systems
Resilience and security of opportunistic communications for emergency evacuation
Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
An efficient certificateless aggregate signature with constant pairing computations
Information Sciences: an International Journal
Unified security architecture and protocols using third party identity in V2V and V2I networks
Wireless Communications & Mobile Computing
Security and Communication Networks
Identity-based multi-receiver threshold signcryption scheme
Security and Communication Networks
Generalized key delegation for hierarchical identity-based encryption
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Practical time capsule signatures in the standard model from bilinear maps
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Proxy re-encryption systems for identity-based encryption
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Identity-based encryption: how to decrypt multiple ciphertexts using a single decryption key
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
An efficient signcryption scheme with key privacy
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Direct chosen-ciphertext secure hierarchical ID-based encryption schemes
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Certificate-based signature: security model and efficient construction
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Time capsule signature: efficient and provably secure constructions
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Electronic payment scheme using identity-based cryptography
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
ZigBee security using identity-based cryptography
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Identity-based proxy signature from pairings
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Efficient and dynamic key management for multiple identities in identity-based systems
Information Sciences: an International Journal
Efficient ID-based non-malleable trapdoor commitment
Computers and Electrical Engineering
Additively homomorphic encryption with a double decryption mechanism, revisited
ISC'12 Proceedings of the 15th international conference on Information Security
Secure hierarchical identity-based identification without random oracles
ISC'12 Proceedings of the 15th international conference on Information Security
ID based signcryption scheme in standard model
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Anonymous identity-based hash proof system and its applications
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Efficient escrow-free identity-based signature
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Perfect keyword privacy in PEKS systems
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Efficient fully secure attribute-based encryption schemes for general access structures
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Symmetric inner-product predicate encryption based on three groups
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Authenticated key exchange with entities from different settings and varied groups
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Future Generation Computer Systems
Identity-based data storage in cloud computing
Future Generation Computer Systems
ID-Based signatures from lattices in the random oracle model
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
On the realization of fuzzy identity-based identification scheme using fingerprint biometrics
Security and Communication Networks
An efficient and provably-secure certificateless signature scheme without bilinear pairings
International Journal of Communication Systems
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Time-Specific encryption from forward-secure encryption
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Security and Communication Networks
Security and Communication Networks
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
Theoretical Computer Science
Adaptively secure forward-secure non-interactive threshold cryptosystems
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Fault attacks against the miller algorithm in hessian coordinates
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Efficient self-certified signatures with batch verification
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
A generic construction from Selective-IBE to public-key encryption with non-interactive opening
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Adaptively secure efficient lattice (H)IBE in standard model with short public parameters
SPACE'12 Proceedings of the Second international conference on Security, Privacy, and Applied Cryptography Engineering
Security enhancement of identity-based identification with reversibility
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Non-interactive dynamic identity-based broadcast encryption without random oracles
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
SMSCrypto: A lightweight cryptographic framework for secure SMS transmission
Journal of Systems and Software
Wireless Personal Communications: An International Journal
A novel identity-based key management and encryption scheme for distributed system
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Efficient and robust identity-based handoff authentication in wireless networks
NSS'12 Proceedings of the 6th international conference on Network and System Security
Practical certificateless public key encryption in the standard model
NSS'12 Proceedings of the 6th international conference on Network and System Security
Direct CCA secure identity-based broadcast encryption
NSS'12 Proceedings of the 6th international conference on Network and System Security
Short and efficient convertible undeniable signature schemes without random oracles
Theoretical Computer Science
Information Security Tech. Report
A Zone-Based Node Replica Detection Scheme for Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Accountable authority identity-based encryption with public traceability
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Efficient delegation of key generation and revocation functionalities in identity-based encryption
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Forward-Secure hierarchical predicate encryption
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Shorter IBE and signatures via asymmetric pairings
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
International Journal of Applied Cryptography
Composite trust-based public key management in mobile ad hoc networks
Proceedings of the 28th Annual ACM Symposium on Applied Computing
COMPASS: authenticated group key agreement from signcryption
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Provably secure certificateless one-way and two-party authenticated key agreement protocol
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Ciphertext policy multi-dimensional range encryption
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Galindo-Garcia identity-based signature revisited
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Certificateless threshold signature secure in the standard model
Information Sciences: an International Journal
Leakage-resilient certificateless public key encryption
Proceedings of the first ACM workshop on Asia public-key cryptography
Proceedings of the first ACM workshop on Asia public-key cryptography
Witness encryption and its applications
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
Attribute-based encryption for circuits
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
On the security of a modified Beth identity-based identification scheme
Information Processing Letters
An identity based encryption using elliptic curve cryptography for secure M2M communication
Proceedings of the First International Conference on Security of Internet of Things
Analysis of mobile authentication protocols by SVO logic
Proceedings of the First International Conference on Security of Internet of Things
A secure and efficient registration for IP mobility
Proceedings of the First International Conference on Security of Internet of Things
Efficient hierarchical identity-based signatures from lattices
International Journal of Electronic Security and Digital Forensics
Confused Johnny: when automatic encryption leads to confusion and mistakes
Proceedings of the Ninth Symposium on Usable Privacy and Security
Server-aided identity-based anonymous broadcast encryption
International Journal of Security and Networks
Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
Information Sciences: an International Journal
Certificate-based proxy decryption systems with revocability in the standard model
Information Sciences: an International Journal
Security and privacy of electric vehicles in the smart grid context: problem and solution
Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications
On the conventional public key in identification-based encryption: the case of RSA
International Journal of Information and Computer Security
Practical constructions and new proof methods for large universe attribute-based encryption
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
A security protocol for information-centric networking in smart grids
Proceedings of the first ACM workshop on Smart energy grid security
AtDRM: a DRM architecture with rights transfer and revocation capability
Proceedings of the 6th ACM India Computing Convention
Leakage resilient IBE and IPE under the DLIN assumption
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
An efficient attribute-based signature scheme with claim-predicate mechanism
International Journal of Grid and Utility Computing
Leakage-resilient identity-based encryption scheme
International Journal of Grid and Utility Computing
Non-delegatable strong designated verifier signature using a trusted third party without pairings
AISC '13 Proceedings of the Eleventh Australasian Information Security Conference - Volume 138
Improvement on Meshram et al.'s ID-based cryptographic mechanism
Information Processing Letters
Efficient identity-based encryption without pairings and key escrow for mobile devices
WASA'13 Proceedings of the 8th international conference on Wireless Algorithms, Systems, and Applications
Privacy-preserving ID-based key agreement protocols for cluster-based MANETs
International Journal of Ad Hoc and Ubiquitous Computing
Crypto-Book: an architecture for privacy preserving online identities
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks
Privacy-preserving ID-based key agreement protocols for cluster-based MANETs
International Journal of Ad Hoc and Ubiquitous Computing
Non-Interactive Authenticated Key Agreement over the Mobile Communication Network
Mobile Networks and Applications
Proceedings of the 4th ACM conference on Data and application security and privacy
An ID-based online/offline signature scheme without random oracles for wireless sensor networks
Personal and Ubiquitous Computing
Security weaknesses of a signature scheme and authenticated key agreement protocols
Information Processing Letters
Robust smart card secured authentication scheme on SIP using Elliptic Curve Cryptography
Computer Standards & Interfaces
On the security of an enhanced signature scheme
International Journal of Information and Communication Technology
Cryptanalysis and improvement of a certificateless encryption scheme in the standard model
Frontiers of Computer Science: Selected Publications from Chinese Universities
On the node clone detection in wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Identity-based chameleon hashing and signatures without key exposure
Information Sciences: an International Journal
On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol
Wireless Personal Communications: An International Journal
Software Service Signature (S3) for authentication in cloud computing
Cluster Computing
Provable certificateless generalized signcryption scheme
Designs, Codes and Cryptography
The relation and transformation between hierarchical inner product encryption and spatial encryption
Designs, Codes and Cryptography
STSHC: secure and trusted scheme for Hadoop cluster
International Journal of High Performance Systems Architecture
Enhanced Dynamic Authentication Scheme (EDAS)
Information Systems Frontiers
Certificate-free ad hoc anonymous authentication
Information Sciences: an International Journal
Insecurity of an efficient certificateless aggregate signature with constant pairing computations
Information Sciences: an International Journal
Symmetric Threshold Multipath (STM): An online symmetric key management scheme
Information Sciences: an International Journal
Hi-index | 0.05 |