Building Key-Private Public-Key Encryption Schemes
From MaRDI portal
Publication:3634499
DOI10.1007/978-3-642-02620-1_20zbMath1284.94098OpenAlexW1857549983MaRDI QIDQ3634499
Sriramkrishnan Srinivasan, Kenneth G. Paterson
Publication date: 25 June 2009
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-02620-1_20
standard modelpublic-key encryptionidentity-based encryptionkey-privacymultiple trusted authoritiesTA anonymity
Related Items (2)
Towards tight adaptive security of non-interactive key exchange ⋮ An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Advances in cryptology - CRYPTO '98. 18th annual international cryptology conference, Santa Barbara, CA, USA, August 23--27, 1998. Proceedings
- Advances in cryptology -- EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2--6, 2004. Proceedings.
- Identity-Based Cryptosystems and Signature Schemes
- Practical Identity-Based Encryption Without Random Oracles
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Topics in Cryptology – CT-RSA 2005
This page was built for publication: Building Key-Private Public-Key Encryption Schemes