Forward-Secure Identity-Based Public-Key Encryption without Random Oracles (vol 111, pg 241, 2011)

被引:0
|
作者
Yu, Jia
Kong, Fanyu
Cheng, Xiangguo
Hao, Rong
Fan, Jianxi
机构
关键词
D O I
10.3233/FI-2011-619
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:103 / 103
页数:1
相关论文
共 50 条
  • [1] Forward-Secure Identity-Based Public-Key Encryption without Random Oracles
    Yu, Jia
    Cheng, Xiangguo
    Hao, Rong
    Kong, Fanyu
    Fan, Jianxi
    [J]. FUNDAMENTA INFORMATICAE, 2011, 111 (02) : 241 - 256
  • [2] New forward-secure public-key encryption without random oracles
    Lu, Yang
    Li, Jiguo
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2013, 90 (12) : 2603 - 2613
  • [3] An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles
    Lu, Yang
    Li, Jiguo
    [J]. THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 22 - 25
  • [4] Secure public-key encryption scheme without random oracles
    Tan, Chik How
    [J]. INFORMATION SCIENCES, 2008, 178 (17) : 3435 - 3442
  • [5] A Forward-Secure Public-Key Encryption Scheme
    Ran Canetti
    Shai Halevi
    Jonathan Katz
    [J]. Journal of Cryptology, 2007, 20 : 265 - 294
  • [6] A forward-secure public-key encryption scheme
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    [J]. JOURNAL OF CRYPTOLOGY, 2007, 20 (03) : 265 - 294
  • [7] A forward-secure public-key encryption scheme
    Canetti, R
    Halevi, S
    Katz, J
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 255 - 271
  • [8] Forward-secure identity-based encryption scheme
    Yang, Hao-Miao
    Sun, Shi-Xin
    Li, Hong-Wei
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (03): : 534 - 537
  • [9] Forward-Secure Revocable Identity-Based Encryption
    Qin, Baodong
    Bai, Xue
    Zheng, Dong
    Cui, Hui
    Luo, Yiyuan
    [J]. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 : 321 - 340
  • [10] Forward-secure Public-Key Encryption Scheme with Tamper Evidence
    Jiang Han
    Xu QiuLiang
    Hou MengBo
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 656 - 659