Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Supersingular Abelian Varieties in Cryptology
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Secure Integration of Asymmetric and Symmetric Encryption Schemes
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Toward Hierarchical Identity-Based Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks
ASIACRYPT '99 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Identity Based Encryption Scheme Based on Quadratic Residues
Proceedings of the 8th IMA International Conference on Cryptography and Coding
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
Breaking and repairing optimistic fair exchange from PODC 2003
Proceedings of the 3rd ACM workshop on Digital rights management
Broadcast encryption with short keys and transmissions
Proceedings of the 3rd ACM workshop on Digital rights management
New traitor tracing schemes using bilinear map
Proceedings of the 3rd ACM workshop on Digital rights management
The dual receiver cryptosystem and its applications
Proceedings of the 11th ACM conference on Computer and communications security
Proceedings of the 11th ACM conference on Computer and communications security
ID-based threshold decryption without random oracles and its application in key escrow
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Direct chosen ciphertext security from identity-based techniques
Proceedings of the 12th ACM conference on Computer and communications security
An efficient identity-based signature scheme with batch verifications
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Low-cost communication for rural internet kiosks using mechanical backhaul
Proceedings of the 12th annual international conference on Mobile computing and networking
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Forward-secure signatures with untrusted update
Proceedings of the 13th ACM conference on Computer and communications security
Identity-based secure collaboration in wireless ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Applicability of identity-based cryptography for disruption-tolerant networking
Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking
Domain-based administration of identity-based cryptosystems for secure email and IPSEC
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
How to construct secure proxy cryptosystem
Information Sciences: an International Journal
What can identity-based cryptography offer to web services?
Proceedings of the 2007 ACM workshop on Secure web services
Proceedings of the 14th ACM conference on Computer and communications security
Provably Secure Timed-Release Public Key Encryption
ACM Transactions on Information and System Security (TISSEC)
A tapestry of identity-based encryption: practical frameworks compared
International Journal of Applied Cryptography
A survey of key evolving cryptosystems
International Journal of Security and Networks
Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Improved certificate-based encryption in the standard model
Journal of Systems and Software
New Multiparty Signature Schemes for Network Routing Applications
ACM Transactions on Information and System Security (TISSEC)
Pervasive and Mobile Computing
Forward Secure Threshold Signature Scheme from Bilinear Pairings
Computational Intelligence and Security
Generalization of the Selective-ID Security Model for HIBS Protocols
Computational Intelligence and Security
General Ad Hoc Encryption from Exponent Inversion IBE
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Identity-Based Proxy Re-encryption
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Multi-Identity Single-Key Decryption without Random Oracles
Information Security and Cryptology
Delegating Capabilities in Predicate Encryption Systems
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
Identity-Based Online/Offline Encryption
Financial Cryptography and Data Security
Proxy Re-signatures in the Standard Model
ISC '08 Proceedings of the 11th international conference on Information Security
General Certificateless Encryption and Timed-Release Encryption
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Trust management for secure information flows
Proceedings of the 15th ACM conference on Computer and communications security
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Generalized Identity Based and Broadcast Encryption Schemes
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
New Construction of Short Hierarchical ID-Based Signature in the Standard Model
Fundamenta Informaticae
Identity-Based Encryptions with Tight Security Reductions to the BDH Problem
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Hierarchical Identity Based Encryption with Polynomially Many Levels
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Removing Escrow from Identity-Based Encryption
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption
Information Security and Cryptology --- ICISC 2008
Adaptive-ID Secure Revocable Identity-Based Encryption
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Key Evolution Systems in Untrusted Update Environments
Information Security and Cryptology
An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
On the Theoretical Gap between Group Signatures with and without Unlinkability
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Identity Based Group Signatures from Hierarchical Identity-Based Encryption
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Forward-Secure Group Signatures from Pairings
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
Theoretical Computer Science
Patient controlled encryption: ensuring privacy of electronic medical records
Proceedings of the 2009 ACM workshop on Cloud computing security
CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles
Journal of Systems and Software
Spatial Encryption under Simpler Assumption
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
How to Prove Security of a Signature with a Tighter Security Reduction
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Hierarchical Predicate Encryption for Inner-Products
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Efficient hybrid encryption from ID-based encryption
Designs, Codes and Cryptography
Efficient ID-based blind signature and proxy signature from bilinear pairings
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Separating encryption and key issuance in digital rights management systems
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Parallel key-insulated public key encryption without random oracles
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
A forward-secure public-key encryption scheme
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Certificate-based encryption and the certificate revocation problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Access control using pairing based cryptography
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Reducing trust in the PKG in identity based cryptosystems
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Construction of a hybrid HIBE protocol secure against adaptive attacks: without random oracle
ProvSec'07 Proceedings of the 1st international conference on Provable security
Formal security treatments for signatures from identity-based encryption
ProvSec'07 Proceedings of the 1st international conference on Provable security
Decryptable searchable encryption
ProvSec'07 Proceedings of the 1st international conference on Provable security
Identity-based broadcast encryption with constant size ciphertexts and private keys
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Multi-key hierarchical identity-based signatures
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
A new public key broadcast encryption using Boneh-Boyen-Goh's HIBE scheme
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
CCA2 secure IBE: standard model efficiency through authenticated symmetric encryption
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Efficient and adaptively secure append-only signature
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Secure attribute-based systems
Journal of Computer Security
Authorization within grid-computing using certificateless identity-based proxy signature
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing
Energy-efficient key distribution and revocation in tactical networks with asymmetric links
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Efficient proxy signcryption scheme with provable CCA and CMA security
Computers & Mathematics with Applications
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Proceedings of the 17th ACM conference on Computer and communications security
Deniable cloud storage: sharing files via public-key deniability
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Key Evolution Systems in Untrusted Update Environments
ACM Transactions on Information and System Security (TISSEC)
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Fully secure functional encryption with general relations from the decisional linear assumption
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Efficient indifferentiable hashing into ordinary elliptic curves
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Estimating the size of the image of deterministic hash functions to elliptic curves
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
Adaptively secure identity-based identification from lattices without random oracles
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Forward-secure identity-based signature: Security notions and construction
Information Sciences: an International Journal
Identity-based strong designated verifier signature revisited
Journal of Systems and Software
How to construct interval encryption from binary tree encryption
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Practical security for disconnected nodes
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Identity based encryption: Progress and challenges
Information Security Tech. Report
Hierarchical ID-based authenticated key exchange resilient to ephemeral key leakage
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
How to construct identity-based signatures without the key escrow problem
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Deterministic encoding and hashing to odd hyperelliptic curves
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Relations between semantic security and anonymity in identity-based encryption
Information Processing Letters
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Generic constructions for chosen-ciphertext secure attribute based encryption
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Fully secure accountable-authority identity-based encryption
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Achieving leakage resilience through dual system encryption
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Functional encryption: definitions and challenges
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Unbounded HIBE and attribute-based encryption
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Decentralizing attribute-based encryption
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
New fully secure hierarchical identity-based encryption with constant size ciphertexts
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Another elliptic curve model for faster pairing computation
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Hierarchical-CPK-based trusted computing cryptography scheme
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
A variant of Boyen-waters anonymous IBE scheme
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Exclusion-intersection encryption
International Journal of Security and Networks
A generic transformation from symmetric to asymmetric broadcast encryption
ISC'06 Proceedings of the 9th international conference on Information Security
HIBE with short public parameters without random oracle
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Forward-Secure and searchable broadcast encryption with short ciphertexts and private keys
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Identity-based key-insulated signature with secure key-updates
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Efficient intrusion-resilient signatures without random oracles
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
On pairing-based cryptosystems
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Multi-receiver identity-based key encapsulation with shortened ciphertext
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Intrusion-resilient identity-based signature: Security definition and construction
Journal of Systems and Software
Poster: trans-organizational role-based access control
Proceedings of the 18th ACM conference on Computer and communications security
Identity-Based encryption gone wild
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Identity-Based hierarchical strongly key-insulated encryption and its application
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Cryptography based on bilinear maps
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Applying fujisaki-okamoto to identity-based encryption
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Fine grained control of security capability and forward security in a pairing based signature scheme
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Boneh-Franklin identity based encryption revisited
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Reconsideration on the security of the boneh-franklin identity-based encryption scheme
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Constructing secure proxy cryptosystem
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Authenticated public key distribution scheme without trusted third party
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A cryptographic framework for the controlled release of certified data
SP'04 Proceedings of the 12th international conference on Security Protocols
A strong identity based key-insulated cryptosystem
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
A new hierarchical ID-Based cryptosystem and CCA-Secure PKE
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
New techniques for dual system encryption and fully secure HIBE with short ciphertexts
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
Efficient public key broadcast encryption using identifier of receivers
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Cryptosystems based on elliptic curve pairing
MDAI'05 Proceedings of the Second international conference on Modeling Decisions for Artificial Intelligence
One-Way and two-party authenticated ID-Based key agreement protocols using pairing
MDAI'05 Proceedings of the Second international conference on Modeling Decisions for Artificial Intelligence
Chosen-ciphertext security of multiple encryption
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Efficient revocation of security capability in certificateless public key cryptography
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Verifiable pairing and its applications
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Peer collaboration in wireless ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Interoperation between a conventional PKI and an ID-Based infrastructure
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Efficient identity-based encryption without random oracles
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Hierarchical identity based encryption with constant size ciphertext
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Time-based release of confidential information in hierarchical settings
ISC'05 Proceedings of the 8th international conference on Information Security
New ID-Based threshold signature scheme from bilinear pairings
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Bonsai trees, or how to delegate a lattice basis
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Efficient lattice (H)IBE in the standard model
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Chosen-ciphertext secure threshold identity-based key encapsulation without random oracles
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Anonymous hierarchical identity-based encryption (without random oracles)
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
Generalization of the Selective-ID security model for HIBE protocols
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Identity-Based aggregate signatures
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Compact group signatures without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Practical identity-based encryption without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Efficient identity-based signatures secure in the standard model
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
New constructions of constant size ciphertext HIBE without random oracle
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Authenticated group key agreement for multicast
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Anonymity from asymmetry: new constructions for anonymous HIBE
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Yet another forward secure signature from bilinear pairings
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Functional encryption for inner product predicates from learning with errors
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Generic construction of designated tester public-key encryption with keyword search
Information Sciences: an International Journal
An efficient security framework for mobile WiMAX
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Tools for simulating features of composite order bilinear groups in the prime order setting
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Scalable group signatures with revocation
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
From selective to full security: semi-generic transformations in the standard model
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Improved security for linearly homomorphic signatures: a generic framework
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
RIKE: using revocable identities to support key escrow in PKIs
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model
Fundamenta Informaticae
Forward-Secure Identity-Based Public-Key Encryption without Random Oracles
Fundamenta Informaticae
New Construction of Short Hierarchical ID-Based Signature in the Standard Model
Fundamenta Informaticae
A performance analysis of identity-based encryption schemes
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Functional encryption: a new vision for public-key cryptography
Communications of the ACM
Generalized key delegation for hierarchical identity-based encryption
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Practical time capsule signatures in the standard model from bilinear maps
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Proxy re-encryption systems for identity-based encryption
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Identity-based encryption: how to decrypt multiple ciphertexts using a single decryption key
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Direct chosen-ciphertext secure hierarchical ID-based encryption schemes
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Secure hierarchical identity-based identification without random oracles
ISC'12 Proceedings of the 15th international conference on Information Security
Indifferentiable hashing to barreto---naehrig curves
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
Security and Communication Networks
A generic construction from Selective-IBE to public-key encryption with non-interactive opening
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Adaptively secure efficient lattice (H)IBE in standard model with short public parameters
SPACE'12 Proceedings of the Second international conference on Security, Privacy, and Applied Cryptography Engineering
Fully secure hidden vector encryption under standard assumptions
Information Sciences: an International Journal
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Accountable authority identity-based encryption with public traceability
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Efficient delegation of key generation and revocation functionalities in identity-based encryption
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Forward-Secure hierarchical predicate encryption
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
International Journal of Applied Cryptography
Efficient hierarchical identity-based signatures from lattices
International Journal of Electronic Security and Digital Forensics
Server-aided identity-based anonymous broadcast encryption
International Journal of Security and Networks
A security protocol for information-centric networking in smart grids
Proceedings of the first ACM workshop on Smart energy grid security
Efficient identity-based encryption without pairings and key escrow for mobile devices
WASA'13 Proceedings of the 8th international conference on Wireless Algorithms, Systems, and Applications
Non-Interactive Authenticated Key Agreement over the Mobile Communication Network
Mobile Networks and Applications
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
Information Sciences: an International Journal
Towards a cryptographic treatment of publish/subscribe systems
Journal of Computer Security
Hi-index | 0.02 |
We present hierarchical identity-based encryption schemes and signature schemes that have total collusion resistance on an arbitrary number of levels and that have chosen ciphertext security in the random oracle model assuming the difficulty of the Bilinear Diffie-Hellman problem.