Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Fine-grained control of security capabilities
ACM Transactions on Internet Technology (TOIT)
New client puzzle outsourcing techniques for DoS resistance
Proceedings of the 11th ACM conference on Computer and communications security
Managing Multiple and Dependable Identities
IEEE Internet Computing
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
WWW '05 Proceedings of the 14th international conference on World Wide Web
SELS: a secure e-mail list service
Proceedings of the 2005 ACM symposium on Applied computing
Hardware and Software Normal Basis Arithmetic for Pairing-Based Cryptography in Characteristic Three
IEEE Transactions on Computers
An Identity Based Encryption system
Proceedings of the 3rd international symposium on Principles and practice of programming in Java
Privacy enhanced cellular access security
Proceedings of the 4th ACM workshop on Wireless security
Security and usability engineering with particular attention to electronic mail
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Untraceable RFID tags via insubvertible encryption
Proceedings of the 12th ACM conference on Computer and communications security
Proxy re-signatures: new definitions, algorithms, and applications
Proceedings of the 12th ACM conference on Computer and communications security
Pseudonym management using mediated identity-based cryptography
Proceedings of the 2005 workshop on Digital identity management
Generating More MNT Elliptic Curves
Designs, Codes and Cryptography
Efficient Computation of Roots in Finite Fields
Designs, Codes and Cryptography
Improved proxy re-encryption schemes with applications to secure distributed storage
ACM Transactions on Information and System Security (TISSEC)
Identity-based registry for secure interdomain routing
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
On the relationship between squared pairings and plain pairings
Information Processing Letters
Message authentication by integrity with public corroboration
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Provably secure non-interactive key distribution based on pairings
Discrete Applied Mathematics - Special issue: Coding and cryptography
Forward-secure signatures with untrusted update
Proceedings of the 13th ACM conference on Computer and communications security
Provably-secure time-bound hierarchical key assignment schemes
Proceedings of the 13th ACM conference on Computer and communications security
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Information Sciences: an International Journal
On computable isomorphisms in efficient asymmetric pairing-based systems
Discrete Applied Mathematics
Multi-designated verifiers signatures: anonymity without encryption
Information Processing Letters
Concurrently-secure credential ownership proofs
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Efficient pairing computation on supersingular Abelian varieties
Designs, Codes and Cryptography
Secure pseudonym management using mediated identity-based encryption
Journal of Computer Security - The First ACM Workshop on Digital Identity Management -- DIM 2005
Establishing and protecting digital identity in federation systems
Journal of Computer Security - The First ACM Workshop on Digital Identity Management -- DIM 2005
Lightweight encryption for email
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
Efficient and secure source authentication with packet passports
SRUTI'06 Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet - Volume 2
Malicious KGC attacks in certificateless cryptography
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Surviving attacks on disruption-tolerant networks without authentication
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Certificateless threshold cryptosystem secure against chosen-ciphertext attack
Information Sciences: an International Journal
Cryptographic techniques for mobile ad-hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Certificateless undeniable signature scheme
Information Sciences: an International Journal
A novel ID-based designated verifier signature scheme
Information Sciences: an International Journal
Identity-based ring signatures from RSA
Theoretical Computer Science
Aggregate designated verifier signatures and application to secure routing
International Journal of Security and Networks
International Journal of Security and Networks
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
International Journal of Security and Networks
A survey of key evolving cryptosystems
International Journal of Security and Networks
Special polynomial families for generating more suitable pairing-friendly elliptic curves
EHAC'06 Proceedings of the 5th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications
Stateful identity-based encryption scheme: faster encryption and decryption
Proceedings of the 2008 ACM symposium on Information, computer and communications security
A content-driven access control system
Proceedings of the 7th symposium on Identity and trust on the Internet
Trapdoors for hard lattices and new cryptographic constructions
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
Privacy preserving set intersection based on bilinear groups
ACSC '08 Proceedings of the thirty-first Australasian conference on Computer science - Volume 74
A synthetic indifferentiability analysis of some block-cipher-based hash functions
Designs, Codes and Cryptography
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
A Secure IPv6-based Urban Wireless Mesh Network (SUMNv6)
Computer Communications
Identity Based Multisignatures
Informatica
On the security of public key cryptosystems with a double decryption mechanism
Information Processing Letters
One-Way Signature Chaining: a new paradigm for group cryptosystems
International Journal of Information and Computer Security
Efficient Implementation of Tate Pairing on a Mobile Phone Using Java
Computational Intelligence and Security
General Ad Hoc Encryption from Exponent Inversion IBE
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Non-interactive Proofs for Integer Multiplication
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Identity-Based Proxy Re-encryption
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Security Mediated Certificateless Signatures
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Software Implementation of Arithmetic in
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Revisiting Pairing Based Group Key Exchange
Financial Cryptography and Data Security
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic Polynomials
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Pairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y2 = x5 + ax
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Pairing Computation on Twisted Edwards Form Elliptic Curves
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Exponentiation in Pairing-Friendly Groups Using Homomorphisms
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Generators for the l-Torsion Subgroup of Jacobians of Genus Two Curves
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
ISC '08 Proceedings of the 11th international conference on Information Security
An Identity-Based Key Agreement Protocol for the Network Layer
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks
International Journal of Security and Networks
Personalized search using identity-based hashing
Proceedings of the 4th ACM workshop on Digital identity management
Parameterized access control: from design to prototype
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A secure identity-based proxy multi-signature scheme
Information Sciences: an International Journal
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Constructing UC secure and constant-round group key exchange protocols via secret sharing
EURASIP Journal on Wireless Communications and Networking
A secure identity-based multi-proxy signature scheme
Computers and Electrical Engineering
More Discriminants with the Brezing-Weng Method
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Generalized Identity Based and Broadcast Encryption Schemes
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Constructing PEKS schemes secure against keyword guessing attacks is possible?
Computer Communications
Unidirectional key distribution across time and space with applications to RFID security
SS'08 Proceedings of the 17th conference on Security symposium
RFID-based supply chain partner authentication and key agreement
Proceedings of the second ACM conference on Wireless network security
An identity based universal designated verifier signature scheme secure in the standard model
Journal of Systems and Software
Efficient Identity-Based Encryption with Tight Security Reduction
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Some Efficient Algorithms for the Final Exponentiation of ηT Pairing
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Random Visitor: Defense against Identity Attacks in P2P Networks
IEICE - Transactions on Information and Systems
Efficient Implementation of the Pairing on Mobilephones Using BREW
IEICE - Transactions on Information and Systems
Quantum resistant public key cryptography: a survey
Proceedings of the 8th Symposium on Identity and Trust on the Internet
Blind signature and ring signature schemes: Rehabilitation and attack
Computer Standards & Interfaces
Confidentiality-preserving distributed proofs of conjunctive queries
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Delegate predicate encryption and its application to anonymous authentication
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Asymmetric Group Key Agreement
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Universally Anonymous IBE Based on the Quadratic Residuosity Assumption
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
On the embedding degree of reductions of an elliptic curve
Information Processing Letters
Distributed data source verification in wireless sensor networks
Information Fusion
A New Approach for Biometric Template Storage and Remote Authentication
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Message authentication for wireless sensor networks
CIS'09 Proceedings of the international conference on Computational and information science 2009
An escrow-less identity-based group-key agreement protocol for dynamic peer groups
International Journal of Security and Networks
Improved Implementations of Cryptosystems Based on Tate Pairing
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Securing Mobile Phone Calls with Identity-Based Cryptography
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
A Schnorr-Like Lightweight Identity-Based Signature Scheme
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Certified Encryption Revisited
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Towards compromise-resilient localized authentication architecture for wireless mesh networks
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Efficient and secure protocols for privacy-preserving set operations
ACM Transactions on Information and System Security (TISSEC)
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
ISC '09 Proceedings of the 12th International Conference on Information Security
Privacy-Preserving Policy-Based Information Transfer
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Faster Pairings on Special Weierstrass Curves
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Strongly Secure Certificateless Key Agreement
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
TrueIP: prevention of IP spoofing attacks using identity-based cryptography
Proceedings of the 2nd international conference on Security of information and networks
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
Theoretical Computer Science
Efficient message authentication protocol for WSN
WSEAS Transactions on Computers
IEEE Transactions on Information Forensics and Security
Proceedings of the 16th ACM conference on Computer and communications security
Membership-concealing overlay networks
Proceedings of the 16th ACM conference on Computer and communications security
A simple construction for public-key encryption with revocable anonymity: the honest-sender case
Proceedings of the nineth ACM workshop on Digital rights management
A verifiable, centralized, coercion-free reputation system
Proceedings of the 8th ACM workshop on Privacy in the electronic society
A trustworthiness-based QoS routing protocol for wireless ad hoc networks
IEEE Transactions on Wireless Communications
CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles
Journal of Systems and Software
Detection and Defense of Identity Attacks in P2P Network
ISICA '09 Proceedings of the 4th International Symposium on Advances in Computation and Intelligence
ID-Based Group Password-Authenticated Key Exchange
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Authenticated error-correcting codes with applications to multicast authentication
ACM Transactions on Information and System Security (TISSEC)
Elliptic curves with a pre-determined embedding degree
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
On the relationship between squared pairings and plain pairings
Information Processing Letters
Efficient hybrid encryption from ID-based encryption
Designs, Codes and Cryptography
Proceedings of the 9th Symposium on Identity and Trust on the Internet
Time-selective convertible undeniable signatures with short conversion receipts
Information Sciences: an International Journal
Identity-based encryption based on DHIES
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Pairing calculation on supersingular genus 2 curves
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Anonymous secure communication in wireless mobile ad-hoc networks
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
Some efficient algorithms for the final exponentiation of ηT pairing
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie-Hellman
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Random visitor: a defense against identity attacks in P2P overlay networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Encapsulated scalar multiplications and line functions in the computation of Tate pairing
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
Proxy re-encryption with keyword search
Information Sciences: an International Journal
Secret interest groups (SIGs) in social networks with an implementation on Facebook
Proceedings of the 2010 ACM Symposium on Applied Computing
Pairing-friendly elliptic curves with small security loss by Cheon's algorithm
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
SKEMON: a simple certificate-less method for key exchange by using mobile network
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Cryptography in the multi-string model
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Proxy re-signature schemes without random oracles
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Public key encryption with searchable keywords based on Jacobi symbols
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
A secure intra-domain routing protocol for wireless mesh networks
ICISS'07 Proceedings of the 3rd international conference on Information systems security
CCA2-secure threshold broadcast encryption with shorter ciphertexts
ProvSec'07 Proceedings of the 1st international conference on Provable security
Construction of a hybrid HIBE protocol secure against adaptive attacks: without random oracle
ProvSec'07 Proceedings of the 1st international conference on Provable security
Common secure index for conjunctive keyword-based retrieval over encrypted data
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Randomness reuse: extensions and improvements
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Universal ηT pairing algorithm over arbitrary extension degree
WISA'07 Proceedings of the 8th international conference on Information security applications
Efficient implementation of the pairing on mobilephones using BREW
WISA'07 Proceedings of the 8th international conference on Information security applications
Predicate encryption supporting disjunctions, polynomial equations, and inner products
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Efficient non-interactive proof systems for bilinear groups
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
An efficient countermeasure against side channel attacks for pairing computation
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
CCA2 secure IBE: standard model efficiency through authenticated symmetric encryption
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Public-key encryption with non-interactive opening
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Public key encryption with keyword search based on K-resilient IBE
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Online-untransferable signatures
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Certificateless encryption schemes strongly secure in the standard model
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
A note on information-theoretic secret key exchange over wireless channels
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
VisualSec: a secure message delivery scheme for online social networks based on profile images
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Security policy implementation strategies for common carrier monitoring service providers
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Private key agreement and secure communication for heterogeneous sensor networks
Journal of Parallel and Distributed Computing
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
International Journal of Applied Cryptography
A privacy-preserving scheme for online social networks with efficient revocation
INFOCOM'10 Proceedings of the 29th conference on Information communications
An ID-based aggregate signature scheme with constant pairing computations
Journal of Systems and Software
Dynamic, non-interactive key management for the bundle protocol
Proceedings of the 5th ACM workshop on Challenged networks
Certificateless key agreement in the standard model
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
Securing wireless sensor networks: an identity-based cryptography approach
International Journal of Sensor Networks
Attribute-Based Messaging: Access Control and Confidentiality
ACM Transactions on Information and System Security (TISSEC)
Efficient completely non-malleable public key encryption
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming
Efficient chosen-ciphertext security via extractable hash proofs
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Efficient certificateless KEM in the standard model
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Searching keywords with wildcards on encrypted data
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
On the efficiency and security of pairing-based protocols in the type 1 and type 4 settings
WAIFI'10 Proceedings of the Third international conference on Arithmetic of finite fields
Network-on-Chip interconnect for pairing-based cryptographic IP cores
Journal of Systems Architecture: the EUROMICRO Journal
The security model of unidirectional proxy re-signature with private re-signature key
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Secure mobile communication via identity-based cryptography and server-aided computations
The Journal of Supercomputing
A privacy-preserving ID-based group key agreement scheme applied in VPAN
SOFSEM'11 Proceedings of the 37th international conference on Current trends in theory and practice of computer science
Efficient generic constructions of timed-release encryption with pre-open capability
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Generating more Kawazoe-Takahashi genus 2 pairing-friendly hyperelliptic curves
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
A variant of Miller's formula and algorithm
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Improved hidden vector encryption with short ciphertexts and tokens
Designs, Codes and Cryptography
Relations between semantic security and anonymity in identity-based encryption
Information Processing Letters
Cryptanalysis of an identity based broadcast encryption scheme without random oracles
Information Processing Letters
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Fully secure accountable-authority identity-based encryption
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Compact identity-based encryption without strong symmetric cipher
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
On the security of the identity-based encryption based on DHIES from ASIACCS 2010
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Biometric cards with advanced signing system
International Journal of Biometrics
MundoMessage: enabling trustworthy ubiquitous emergency communication
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Weakness of Shim's new ID-based tripartite multiple-key agreement protocol
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Identity-based key exchange protocols without pairings
Transactions on computational science X
Signcryption with non-interactive non-repudiation without random oracles
Transactions on computational science X
Identity-based encryption secure against selective opening attack
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Secure and highly efficient three level key management scheme for MANET
WSEAS Transactions on Computers
Fuzzy identity based signature with applications to biometric authentication
Computers and Electrical Engineering
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
Information Sciences: an International Journal
Threshold and revocation cryptosystems via extractable hash proofs
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Generic methods to achieve tighter security reductions for a category of IBE schemes
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Privacy enhanced access control by means of policy blinding
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Another elliptic curve model for faster pairing computation
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Affiliation-hiding authentication with minimal bandwidth consumption
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Adaptively secure non-interactive threshold cryptosystems
ICALP'11 Proceedings of the 38th international conference on Automata, languages and programming - Volume Part II
SEC'11 Proceedings of the 20th USENIX conference on Security
A new leakage-resilient IBE scheme in the relative leakage model
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Time-lock puzzles in the random oracle model
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
Searchable encryption for outsourced data analytics
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Policy Management for Secure Data Access Control in Vehicular Networks
Journal of Network and Systems Management
The twin bilinear diffie-Hellman inversion problem and applications
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Efficient pairing computation on Elliptic curves in Hessian form
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Verifiable security of Boneh-Franklin identity-based encryption
ProvSec'11 Proceedings of the 5th international conference on Provable security
Fully distributed broadcast encryption
ProvSec'11 Proceedings of the 5th international conference on Provable security
Generalized learning problems and applications to non-commutative cryptography
ProvSec'11 Proceedings of the 5th international conference on Provable security
Non-interactive distributed encryption: a new primitive for revocable privacy
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Extension of Barreto-Voloch root extraction method
ICICS'11 Proceedings of the 13th international conference on Information and communications security
An improved two-party identity-based authenticated key agreement protocol using pairings
Journal of Computer and System Sciences
Exclusion-intersection encryption
International Journal of Security and Networks
HIBE with short public parameters without random oracle
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
On the generic construction of identity-based signatures with additional properties
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Deniable authenticated key establishment for internet protocols
Proceedings of the 11th international conference on Security Protocols
On pairing-based cryptosystems
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Escrowed linkability of ring signatures and its applications
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Reducing the spread of damage of key exposures in key-insulated encryption
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
AMPol-Q: adaptive middleware policy to support qos
ICSOC'06 Proceedings of the 4th international conference on Service-Oriented Computing
Conditionally verifiable signature
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Secure cryptographic workflow in the standard model
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Multi-receiver identity-based key encapsulation with shortened ciphertext
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Identity-based key distribution for mobile Ad Hoc networks
Frontiers of Computer Science in China
From proxy encryption primitives to a deployable secure-mailing-list solution
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Secure set membership using 3SAT
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
New extensions of pairing-based signatures into universal designated verifier signatures
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Identity-Based encryption gone wild
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Identity-Based hierarchical strongly key-insulated encryption and its application
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Universally convertible directed signatures
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
A secure PIM-SM multicast routing protocol
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
Security of two-party identity-based key agreement
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
A new method of building more non-supersingular elliptic curves
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Boneh-Franklin identity based encryption revisited
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Implementing cryptographic pairings on smartcards
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
The geometry of flex tangents to a cubic curve and its parameterizations
Journal of Symbolic Computation
Efficient group key management for dynamic peer networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Faster pairings using an elliptic curve with an efficient endomorphism
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Improvements on security proofs of some identity based encryption schemes
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Fast bilinear maps from the tate-lichtenbaum pairing on hyperelliptic curves
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
High security pairing-based cryptography revisited
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
Attribute-based encryption schemes with constant-size ciphertexts
Theoretical Computer Science
A provably secure short transitive signature scheme from bilinear group pairs
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Designated verifier signatures: anonymity and efficient construction from any bilinear map
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Time-selective convertible undeniable signatures
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Evaluating 2-DNF formulas on ciphertexts
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
(SE-33)Intelligent ID-Based threshold system by an encryption and decryption from bilinear pairing
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority
Journal of Systems and Software
Public-Key encryption from ID-Based encryption without one-time signature
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Interoperation between a conventional PKI and an ID-Based infrastructure
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Efficient identity-based encryption without random oracles
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Hardware acceleration of the tate pairing in characteristic three
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Efficient computation of tate pairing in projective coordinate over general characteristic fields
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Dynamic attribute-based signcryption without random oracles
International Journal of Applied Cryptography
A method for efficient parallel computation of Tate pairing
International Journal of Grid and Utility Computing
Secure and privacy preserving keyword searching for cloud storage services
Journal of Network and Computer Applications
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Practical private set intersection protocols with linear complexity
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Solving a 676-bit discrete logarithm problem in GF(36n)
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
Secure obfuscation for encrypted signatures
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Bonsai trees, or how to delegate a lattice basis
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Pairing based threshold cryptography improving on libert-quisquater and baek-zheng
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
A generic construction for token-controlled public key encryption
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Revisiting oblivious signature-based envelopes
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Chosen-ciphertext secure threshold identity-based key encapsulation without random oracles
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Non-interactive zaps and new techniques for NIZK
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Anonymous hierarchical identity-based encryption (without random oracles)
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Parallel key-insulated public key encryption
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Generalization of the Selective-ID security model for HIBE protocols
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Identity-Based aggregate signatures
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
On the limitations of the spread of an IBE-to-PKE transformation
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Security-Mediated certificateless cryptography
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Public key encryption with keyword search based on k-resilient IBE
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
A separation between selective and full-identity security notions for identity-based encryption
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Practical identity-based encryption without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Efficient and provably secure multi-receiver identity-based signcryption
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Chosen ciphertext security from identity-based encryption without strong condition
IWSEC'06 Proceedings of the 1st international conference on Security
New constructions of constant size ciphertext HIBE without random oracle
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Efficient identity-based encryption with tight security reduction
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Side channel attacks and countermeasures on pairing based cryptosystems over binary fields
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Generic constructions of biometric identity based encryption systems
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
A scalable wireless routing protocol secure against route truncation attacks
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Efficient identity-based key encapsulation to multiple parties
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Pocket switched networking: challenges, feasibility and implementation issues
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Chosen-Ciphertext security from tag-based encryption
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Pairing-Friendly elliptic curves of prime order
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Dynamic attribute-based signcryption without random oracles
International Journal of Applied Cryptography
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Functional encryption for inner product predicates from learning with errors
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
On the joint security of encryption and signature, revisited
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Identity-Based signcryption from identity-based cryptography
WISA'11 Proceedings of the 12th international conference on Information Security Applications
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Publicly verifiable secret sharing for cloud-based key management
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
ARDEN: Anonymous networking in delay tolerant networks
Ad Hoc Networks
A novel commutative blinding identity based encryption scheme
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
New Techniques for Noninteractive Zero-Knowledge
Journal of the ACM (JACM)
Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network
Proceedings of the Fifth International Conference on Body Area Networks
Computing on authenticated data
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
How to delegate and verify in public: verifiable computation from attribute-based encryption
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
On black-box reductions between predicate encryption schemes
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
ACM Transactions on Information and System Security (TISSEC)
Key length estimation of pairing-based cryptosystems using ηT pairing
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Identity-Based (lossy) trapdoor functions and applications
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Survey: Innovative approaches for security of small artefacts
Computer Science Review
Polynomial approximation of bilinear Diffie--Hellman maps
Finite Fields and Their Applications
Algebraic curves and cryptography
Finite Fields and Their Applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
A secure handshake scheme with symptoms-matching for mHealthcare social network
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
An ID-based cryptographic mechanisms based on GDLP and IFP
Information Processing Letters
Enhancing privacy in cloud computing via policy-based obfuscation
The Journal of Supercomputing
Variants of waters' dual system primitives using asymmetric pairings
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
From selective to full security: semi-generic transformations in the standard model
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Identity-based extractable hash proofs and their applications
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Inner-product lossy trapdoor functions and applications
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
A generic construction of accountable decryption and its applications
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Anonymous ID-based proxy re-encryption
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Revocable identity-based encryption from lattices
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Enhanced authentication for commercial video services
Security and Communication Networks
SILENTKNOCK: practical, provably undetectable authentication
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Generalized key delegation for hierarchical identity-based encryption
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Implementing cryptographic pairings
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Ring signatures of sub-linear size without random oracles
ICALP'07 Proceedings of the 34th international conference on Automata, Languages and Programming
Strongly-secure identity-based key agreement and anonymous extension
ISC'07 Proceedings of the 10th international conference on Information Security
Additively homomorphic encryption with a double decryption mechanism, revisited
ISC'12 Proceedings of the 15th international conference on Information Security
Secure hierarchical identity-based identification without random oracles
ISC'12 Proceedings of the 15th international conference on Information Security
Anonymous identity-based hash proof system and its applications
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Efficient fully secure attribute-based encryption schemes for general access structures
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Future Generation Computer Systems
Homomorphic encryption for multiplications and pairing evaluation
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Securing pairing-based cryptography on smartcards
International Journal of Information and Computer Security
Proxy re-encryption in a privacy-preserving cloud computing DRM scheme
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Dual form signatures: an approach for proving security from static assumptions
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
RKA security beyond the linear barrier: IBE, encryption and signatures
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
A communication efficient group key distribution scheme for MANETs
NSS'12 Proceedings of the 6th international conference on Network and System Security
Server-aided signatures verification secure against collusion attack
Information Security Tech. Report
The k-BDH assumption family: bilinear map cryptography from progressively weaker assumptions
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Adaptively secure non-interactive threshold cryptosystems
Theoretical Computer Science
Shorter IBE and signatures via asymmetric pairings
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
On the implementation of a pairing-based cryptographic protocol in a constrained device
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Tate pairing computation on jacobi's elliptic curves
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
A simplified privacy preserving message delivery protocol in VDTNs
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Simple and exact formula for minimum loop length in Atei pairing based on Brezing---Weng curves
Designs, Codes and Cryptography
International Journal of Applied Cryptography
A group signature scheme with unbounded message-dependent opening
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Witness encryption and its applications
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
Fast transmission to remote cooperative groups: a new key management paradigm
IEEE/ACM Transactions on Networking (TON)
POSTER: Identity-based steganography and its applications to censorship resistance
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
On the conventional public key in identification-based encryption: the case of RSA
International Journal of Information and Computer Security
Constructing practical signcryption KEM from standard assumptions without random oracles
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Improvement on Meshram et al.'s ID-based cryptographic mechanism
Information Processing Letters
Improved side channel attacks on pairing based cryptography
COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design
Efficient identity-based encryption without pairings and key escrow for mobile devices
WASA'13 Proceedings of the 8th international conference on Wireless Algorithms, Systems, and Applications
Inverting the final exponentiation of tate pairings on ordinary elliptic curves using faults
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Security and privacy for storage and computation in cloud computing
Information Sciences: an International Journal
PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks
Computer Standards & Interfaces
Broadcast encryption based non-interactive key distribution in MANETs
Journal of Computer and System Sciences
High-performance capabilities for 1-hop containment of network attacks
IEEE/ACM Transactions on Networking (TON)
High Performance Group Merging/Splitting Scheme for Group Key Management
Wireless Personal Communications: An International Journal
Software Service Signature (S3) for authentication in cloud computing
Cluster Computing
Public-key searchable encryption from lattices
International Journal of High Performance Systems Architecture
Hi-index | 0.01 |
We propose a fully functional identity-based encryption (IBE) scheme. The scheme has chosen ciphertext security in the random oracle model assuming a variant of the computational Diffie--Hellman problem. Our system is based on bilinear maps between groups. The Weil pairing on elliptic curves is an example of such a map. We give precise definitions for secure IBE schemes and give several applications for such systems.