Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Some applications of multiple key ciphers
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
A new multiple key cipher and an improved voting scheme
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Society and Group Oriented Cryptography: A New Concept
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Secure Integration of Asymmetric and Symmetric Encryption Schemes
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Identity Based Encryption Scheme Based on Quadratic Residues
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Secure key issuing in ID-based cryptography
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Transformation-free proxy cryptosystems and their applications to electronic commerce
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Threshold key issuing in identity-based cryptosystems
Computer Standards & Interfaces
Establishment of Ad-Hoc Communities through Policy-Based Cryptography
Electronic Notes in Theoretical Computer Science (ENTCS)
Domain-based administration of identity-based cryptosystems for secure email and IPSEC
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
What can identity-based cryptography offer to web services?
Proceedings of the 2007 ACM workshop on Secure web services
Provably Secure Timed-Release Public Key Encryption
ACM Transactions on Information and System Security (TISSEC)
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
International Journal of Security and Networks
Identity-based key issuing without secure channel in a broad area
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
NTRUSign: digital signatures using the NTRU lattice
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Protecting against key escrow and key exposure in identity-based cryptosystem
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
An interpretation of identity-based cryptography
Foundations of security analysis and design IV
VisualSec: a secure message delivery scheme for online social networks based on profile images
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Information Sciences: an International Journal
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
A novel identity-based key issuing scheme based on interacting neural network
ISNN'05 Proceedings of the Second international conference on Advances in neural networks - Volume Part II
The n-Diffie-Hellman problem and its applications
ISC'11 Proceedings of the 14th international conference on Information security
Exclusion-intersection encryption
International Journal of Security and Networks
Collusion-Free policy-based encryption
ISC'06 Proceedings of the 9th international conference on Information Security
Secure cryptographic workflow in the standard model
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Policy-based cryptography and applications
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Security analysis and improvement for key issuing schemes in ID-Based cryptography
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Efficient multi-receiver identity-based encryption and its application to broadcast encryption
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Separable implicit certificate revocation
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Efficient and non-interactive timed-release encryption
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Timed-release and key-insulated public key encryption
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Certificateless public-key signature: security model and efficient construction
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Timed release cryptography from bilinear pairings using hash chains
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
How to solve key escrow and identity revocation in identity-based encryption schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
Identity-based encryption: how to decrypt multiple ciphertexts using a single decryption key
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Time capsule signature: efficient and provably secure constructions
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Efficient identity-based encryption without pairings and key escrow for mobile devices
WASA'13 Proceedings of the 8th international conference on Wireless Algorithms, Systems, and Applications
Hi-index | 0.00 |
We investigate a number of issues related to the use of multiple trust authorities and multiple identities in the type of identifier based cryptography enabled by the Weil and Tate pairings. An example of such a system is the Boneh and Franklin encryption scheme. We present various applications of multiple trust authorities. In particular we focus on how one can equate a trust authority with a way to add contextual information to an identity.