Automata, Languages and Programming
From MaRDI portal
Publication:5716828
DOI10.1007/11523468zbMath1084.94015OpenAlexW2940595899WikidataQ56656999 ScholiaQ56656999MaRDI QIDQ5716828
Publication date: 10 January 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11523468
Related Items
An efficient IBE scheme with tight security reduction in the random oracle model ⋮ KCI-resilient anonymous wireless link-layer authentication protocols ⋮ Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme ⋮ Semi-automated verification of security proofs of quantum cryptographic protocols ⋮ New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem ⋮ Non-Interactive Key Exchange ⋮ New approach to practical leakage-resilient public-key cryptography ⋮ On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited ⋮ Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time ⋮ A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model ⋮ Verifiable Security of Boneh-Franklin Identity-Based Encryption ⋮ Establishment of Ad-Hoc Communities through Policy-Based Cryptography ⋮ Combined schemes for signature and encryption: the public-key and the identity-based setting