Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption
Top Cited Papers
- 1 January 2005
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 28 references indexed in Scilit:
- Secure Identity Based Encryption Without Random OraclesLecture Notes in Computer Science, 2004
- A New Paradigm of Hybrid Encryption SchemeLecture Notes in Computer Science, 2004
- Efficient Selective-ID Secure Identity-Based Encryption Without Random OraclesLecture Notes in Computer Science, 2004
- Chosen-Ciphertext Security from Identity-Based EncryptionLecture Notes in Computer Science, 2004
- Identity-Based Encryption from the Weil PairingSIAM Journal on Computing, 2003
- Nonmalleable CryptographySIAM Journal on Computing, 2000
- A Pseudorandom Generator from any One-way FunctionSIAM Journal on Computing, 1999
- Multiple NonInteractive Zero Knowledge Proofs Under General AssumptionsSIAM Journal on Computing, 1999
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- New hash functions and their use in authentication and set equalityJournal of Computer and System Sciences, 1981