Identity-based encryption with wildcards in the standard model

被引:2
|
作者
School of Information Engineering, Chang'an University, Xi'an, 710064, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
J. China Univ. Post Telecom. | 2009年 / 1卷 / 64-68,80期
基金
中国国家自然科学基金;
关键词
Public key cryptography;
D O I
10.1016/S1005-8885(08)60180-6
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [2] Identity-based Threshold Broadcast Encryption in the Standard Model
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (03): : 400 - 410
  • [3] Revocable identity-based matchmaking encryption in the standard model
    Jiang, Zhe
    Wang, Xiwen
    Zhang, Kai
    Gong, Junqing
    Chen, Jie
    Qian, Haifeng
    [J]. IET INFORMATION SECURITY, 2023, 17 (04) : 567 - 581
  • [4] Novel identity-based broadcast encryption in the standard model
    Zhang, Leyou
    Xu, Zhiqin
    [J]. ICIC Express Letters, Part B: Applications, 2013, 4 (03): : 663 - 669
  • [5] A new Hierarchical identity-based encryption in the standard model
    Zhang, Le-You
    Hu, Yu-Pu
    Wu, Qing
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (04): : 937 - 941
  • [6] Unbounded Hierarchical Identity-based Encryption in the Standard Model
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    Yang, Yang
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (01): : 105 - 112
  • [7] New Fuzzy Identity-Based Encryption in the Standard Model
    Ren, Yanli
    Gu, Dawu
    Wang, Shuozhong
    Zhang, Xinpeng
    [J]. INFORMATICA, 2010, 21 (03) : 393 - 407
  • [8] Efficient chosen-ciphertext secure identity-based encryption with wildcards
    Birkett, James
    Dent, Alexander W.
    Neven, Gregory
    Schuldt, Jacob C. N.
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 274 - +
  • [9] Adaptively secure hierarchical identity-based encryption in the standard model
    Wu, Qing
    [J]. ICIC Express Letters, 2011, 5 (4 B): : 1321 - 1326
  • [10] k-resilient identity-based encryption in the standard model
    Heng, SH
    Kurosawa, K
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01) : 39 - 46