Multi-identity management for identity-based cryptography
From MaRDI portal
Publication:3622776
DOI10.1080/09720529.2008.10698396zbMath1167.94331OpenAlexW2055378952MaRDI QIDQ3622776
Publication date: 28 April 2009
Published in: Journal of Discrete Mathematical Sciences and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/09720529.2008.10698396
Related Items (2)
L-RTAM: Logarithm based reliable trust assessment model for WBSNs ⋮ Quantum cryptography and security analysis
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Multi-Identity Single-Key Decryption without Random Oracles
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key
- Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles
- Topics in Cryptology – CT-RSA 2005
This page was built for publication: Multi-identity management for identity-based cryptography