Secure Cryptographic Workflow in the Standard Model
- 1 January 2006
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- Vol. 2006, 379-393
- https://doi.org/10.1007/11941378_27
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- Security Proof of Sakai-Kasahara’s Identity-Based Encryption SchemeLecture Notes in Computer Science, 2005
- Chosen-Ciphertext Security of Multiple EncryptionLecture Notes in Computer Science, 2005
- Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based EncryptionLecture Notes in Computer Science, 2005
- Access Control Using Pairing Based CryptographyLecture Notes in Computer Science, 2003
- Certificateless Public Key CryptographyLecture Notes in Computer Science, 2003
- A Designer’s Guide to KEMsLecture Notes in Computer Science, 2003
- Relaxing Chosen-Ciphertext SecurityLecture Notes in Computer Science, 2003
- Identity-Based Encryption from the Weil PairingSIAM Journal on Computing, 2003
- Cryptography from Pairings: A Snapshot of Current ResearchInformation Security Technical Report, 2002
- How to share a secretCommunications of the ACM, 1979