Sciweavers

Share
TCC   2010 Theory of Cryptography Conference
Wall of Fame | Most Viewed TCC-2010 Paper
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
9 years 5 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source381
2Download preprint from source324
3Download preprint from source303
4Download preprint from source236
5Download preprint from source231
6Download preprint from source208
7Download preprint from source188
8Download preprint from source188
9Download preprint from source188
10Download preprint from source179
11Download preprint from source179
12Download preprint from source179
13Download preprint from source178
14Download preprint from source176
15Download preprint from source175
16Download preprint from source173
17Download preprint from source170
18Download preprint from source170
19Download preprint from source169
20Download preprint from source166
21Download preprint from source163
22Download preprint from source141
23Download preprint from source140
24Download preprint from source133
25Download preprint from source121
26Download preprint from source119
27Download preprint from source117
books