ASIACRYPT   2005 International Conference on Cryptology
Wall of Fame | Most Viewed ASIACRYPT-2005 Paper
12 years 9 months ago
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, H...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source174
2Download preprint from source131
3Download preprint from source130
4Download preprint from source126
5Download preprint from source125
6Download preprint from source118
7Download preprint from source117
8Download preprint from source117
9Download preprint from source116
10Download preprint from source115
11Download preprint from source109
12Download preprint from source108
13Download preprint from source108
14Download preprint from source105
15Download preprint from source103
16Download preprint from source100
17Download preprint from source100
18Download preprint from source98
19Download preprint from source93
20Download preprint from source92
21Download preprint from source91
22Download preprint from source88
23Download preprint from source82
24Download preprint from source74
25Download preprint from source69
26Download preprint from source61