Sciweavers

102 search results - page 6 / 21
» Practical Identity-Based Encryption Without Random Oracles
Sort
View
SCN
2010
Springer
145views Communications» more  SCN 2010»
14 years 10 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg
PKC
2007
Springer
189views Cryptology» more  PKC 2007»
15 years 5 months ago
Parallel Key-Insulated Public Key Encryption Without Random Oracles
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently i...
Benoît Libert, Jean-Jacques Quisquater, Moti...
ACNS
2010
Springer
187views Cryptology» more  ACNS 2010»
15 years 2 months ago
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signature under the public key of a trusted third party, while maintaining public signature verifi...
Markus Rückert, Michael Schneider 0002, Domin...
ASIACRYPT
2004
Springer
15 years 5 months ago
Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
Mihir Bellare, Adriana Palacio
CRYPTO
2008
Springer
83views Cryptology» more  CRYPTO 2008»
15 years 1 months ago
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas...