Formal Security Treatments for Signatures from Identity-Based Encryption
From MaRDI portal
Publication:3503884
DOI10.1007/978-3-540-75670-5_16zbMath1138.94379OpenAlexW1508977552MaRDI QIDQ3503884
Goichiro Hanaoka, Eiichiro Fujisaki, Yang Cui, Rui Zhang, Hiroshi Imai
Publication date: 10 June 2008
Published in: Provable Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-75670-5_16
Related Items (2)
Adaptive Oblivious Transfer and Generalization ⋮ Formal Security Treatments for Signatures from Identity-Based Encryption
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Probabilistic encryption
- Identity-Based Cryptosystems and Signature Schemes
- Formal Security Treatments for Signatures from Identity-Based Encryption
- Practical Identity-Based Encryption Without Random Oracles
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Hierarchical ID-Based Cryptography
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Public Key Cryptography - PKC 2006
This page was built for publication: Formal Security Treatments for Signatures from Identity-Based Encryption