×

Found 6 Documents (Results 1–6)

Online/offline identity-based signcryption revisited. (English) Zbl 1295.94182

Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 36-51 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On shortening ciphertexts: new constructions for compact public key and stateful encryption schemes. (English) Zbl 1284.94051

Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 302-318 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fuzzy identity-based encryption: new and efficient schemes. (English) Zbl 1156.94332

Li, Yongqing (ed.) et al., Coding and cryptology. Proceedings of the first international workshop, Wuyi Mountain, Fujian, China, June 11–15, 2007. Hackensack, NJ: World Scientific (ISBN 978-981-283-223-8/hbk). Series on Coding Theory and Cryptology 4, 1-14 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Certificate-based signature schemes without pairings or random oracles. (English) Zbl 1181.94113

Wu, Tzong-Chen (ed.) et al., Information security. 11th international conference, ISC 2008, Taipei, Taiwan, September 15–18, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85884-3/pbk). Lecture Notes in Computer Science 5222, 285-297 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Constructing strong KEM from weak KEM (or how to revive the KEM/DEM framework). (English) Zbl 1180.94045

Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 358-374 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Generic constructions of stateful public key encryption and their applications. (English) Zbl 1319.94052

Bellovin, Steven M. (ed.) et al., Applied cryptography and network security. 6th international conference, ACNS 2008, New York, NY, USA, June 3–6, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68913-3/pbk). Lecture Notes in Computer Science 5037, 75-93 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Year of Publication

Main Field