Sciweavers

90 search results - page 8 / 18
» Wildcarded Identity-Based Encryption
Sort
View
CANS
2006
Springer
106views Cryptology» more  CANS 2006»
15 years 1 months ago
Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi,...
EUROCRYPT
2004
Springer
15 years 1 months ago
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
An extended abstract of this paper appears in C. Cachin and J. Camenisch, editors, Advances in Cryptology-EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 22...
Dan Boneh, Xavier Boyen
COMPUTER
2008
55views more  COMPUTER 2008»
14 years 9 months ago
Identity-Based Encryption Comes of Age
Luther Martin
SCN
2008
Springer
147views Communications» more  SCN 2008»
14 years 9 months ago
New Anonymity Notions for Identity-Based Encryption
ded abstract of this paper appeared in Proceedings of the 6th Conference on Security and Cryptography for Networks (SCN '08)
Malika Izabachène, David Pointcheval
SCN
2010
Springer
187views Communications» more  SCN 2010»
14 years 7 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...