Forward-Secure Identity-Based Public-Key Encryption without Random Oracles (vol 111, pg 241, 2011)

被引:0
|
作者
Yu, Jia
Kong, Fanyu
Cheng, Xiangguo
Hao, Rong
Fan, Jianxi
机构
关键词
D O I
10.3233/FI-2011-619
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:103 / 103
页数:1
相关论文
共 50 条
  • [21] Efficient selective-ID secure identity-based encryption without random oracles
    Boneh, D
    Boyen, X
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 223 - 238
  • [22] Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure
    Baek, Joonsang
    Vu, Quang Hieu
    Shoufan, Abdulhadi
    Jones, Andrew
    Wong, Duncan S.
    [J]. COMPUTER JOURNAL, 2013, 56 (04): : 497 - 507
  • [23] Stateful public-key encryption schemes forward-secure against state exposure
    [J]. Baek, J. (joon.baek@kustar.ac.ae), 1600, Oxford University Press (56):
  • [24] Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails
    Wei, Jianghong
    Chen, Xiaofeng
    Wang, Jianfeng
    Hu, Xuexian
    Ma, Jianfeng
    [J]. COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 : 134 - 150
  • [25] Efficient Forward-Secure Identity-Based Encryption Scheme in the Standard Model
    Lu, Yang
    [J]. THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 62 - 69
  • [26] Efficient Selective Identity-Based Encryption Without Random Oracles
    Boneh, Dan
    Boyen, Xavier
    [J]. JOURNAL OF CRYPTOLOGY, 2011, 24 (04) : 659 - 693
  • [27] Efficient Identity-based Broadcast Encryption without Random Oracles
    Hu, Liang
    Liu, Zheli
    Cheng, Xiaochun
    [J]. JOURNAL OF COMPUTERS, 2010, 5 (03) : 331 - 336
  • [28] Anonymous hierarchical identity-based encryption (Without random oracles)
    Boyen, Xavier
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 290 - 307
  • [29] Efficient Selective Identity-Based Encryption Without Random Oracles
    Dan Boneh
    Xavier Boyen
    [J]. Journal of Cryptology, 2011, 24 : 659 - 693
  • [30] CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles
    Ren, Yanli
    Gu, Dawu
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (01) : 153 - 162