Sciweavers

331 search results - page 12 / 67
» Provably Secure Timed-Release Public Key Encryption
Sort
View
CANS
2007
Springer
142views Cryptology» more  CANS 2007»
15 years 2 months ago
Strongly Secure Certificateless Public Key Encryption Without Pairing
Yinxia Sun, Futai Zhang, Joonsang Baek
ASIACRYPT
2009
Springer
15 years 4 months ago
Group Encryption: Non-interactive Realization in the Standard Model
Group encryption (GE) schemes, introduced at Asiacrypt’07, are an encryption analogue of group signatures with a number of interesting applications. They allow a sender to encryp...
Julien Cathalo, Benoît Libert, Moti Yung
ICCSA
2007
Springer
15 years 4 months ago
Public Key Encryption with Keyword Search Based on K-Resilient IBE
An encrypted email is sent from Bob to Alice. A gateway wants to check whether a certain keyword exists in an email or not for some reason (e.g. routing). Nevertheless Alice does n...
Dalia Khader
EUROCRYPT
1999
Springer
15 years 2 months ago
New Public Key Cryptosystems Based on the Dependent-RSA Problems
Since the Diffie-Hellman paper, asymmetric encryption has been a very important topic, and furthermore ever well studied. However, between the efficiency of RSA and the security of...
David Pointcheval
ISPEC
2005
Springer
15 years 3 months ago
Token-Controlled Public Key Encryption
Token-controlled public key encryption (TCPKE) schemes, introduced in [1], offer many possibilities of application in financial or legal scenarios. Roughly speaking, in a TCPKE s...
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo