Information Security and Cryptology - ICISC 2005
From MaRDI portal
Publication:5899301
DOI10.1007/11734727zbMath1184.94235OpenAlexW2493058093MaRDI QIDQ5899301
Sanjit Chatterjee, Palash Sarkar
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11734727
Related Items (18)
Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles ⋮ Batch verification of short signatures ⋮ Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks ⋮ An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model ⋮ A survey on functional encryption ⋮ Wildcarded identity-based encryption ⋮ Relations between semantic security and anonymity in identity-based encryption ⋮ Blind Identity-Based Encryption and Simulatable Oblivious Transfer ⋮ Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies ⋮ Comparing two pairing-based aggregate signature schemes ⋮ Efficient hybrid encryption from ID-based encryption ⋮ Sequential Aggregate Signatures and Multisignatures Without Random Oracles ⋮ Proxy Re-signature Schemes Without Random Oracles ⋮ CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption ⋮ Practical Short Signature Batch Verification ⋮ Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme ⋮ Direct chosen-ciphertext secure identity-based key encapsulation without random oracles ⋮ Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
This page was built for publication: Information Security and Cryptology - ICISC 2005