Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key
- 11 September 2007
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- Security Analysis of the Strong Diffie-Hellman ProblemLecture Notes in Computer Science, 2006
- Hierarchical Identity Based Encryption with Constant Size CiphertextLecture Notes in Computer Science, 2005
- Efficient Selective-ID Secure Identity-Based Encryption Without Random OraclesLecture Notes in Computer Science, 2004
- Short Signatures Without Random OraclesLecture Notes in Computer Science, 2004
- Applications of Multiple Trust Authorities in Pairing Based CryptosystemsLecture Notes in Computer Science, 2002
- Identity-Based Encryption from the Weil PairingLecture Notes in Computer Science, 2001
- A practical public key cryptosystem provably secure against adaptive chosen ciphertext attackLecture Notes in Computer Science, 1998
- Relations among notions of security for public-key encryption schemesPublished by Springer Nature ,1998
- One-Way Accumulators: A Decentralized Alternative to Digital SignaturesLecture Notes in Computer Science, 1994
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993