Certified Encryption Revisited
From MaRDI portal
Publication:3637140
DOI10.1007/978-3-642-02384-2_12zbMath1246.94029OpenAlexW1509932388MaRDI QIDQ3637140
Pooya Farshim, Bogdan Warinschi
Publication date: 7 July 2009
Published in: Progress in Cryptology – AFRICACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-02384-2_12
identity-based encryptionsecurity modelscertificateless encryptioncertified encryptioncorrupt decryption
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Identity-Based Cryptosystems and Signature Schemes
- Practical Identity-Based Encryption Without Random Oracles
- Randomness Re-use in Multi-recipient Encryption Schemeas
- Identity-Based Encryption from the Weil Pairing
- Efficient Identity-Based Encryption Without Random Oracles
- Advances in Cryptology - CRYPTO 2003
- Information Security
- A Closer Look at PKI: Security and Efficiency
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: Certified Encryption Revisited