User menu

Adaptive-ID secure revocable identity-based encryption

Bibliographic reference Libert, Benoît ; Vergnaud, D.. Adaptive-ID secure revocable identity-based encryption.Topics in Cryptology - CT-RSA 2009 (San Francisco, CA, USA, 20-24 April 2009). In: Fischlin, M.;, Topics in Cryptology - CT-RSA 2009, Springer-verlag2009, p. 1-15
Permanent URL http://hdl.handle.net/2078.1/67575
  1. Aiello William, Lodha Sachin, Ostrovsky Rafail, Fast digital identity revocation, Advances in Cryptology — CRYPTO '98 (1998) ISBN:9783540648925 p.137-152, 10.1007/bfb0055725
  2. Bellare Mihir, Rogaway Phillip, Random oracles are practical : a paradigm for designing efficient protocols, 10.1145/168588.168596
  3. Baek Joonsang, Zheng Yuliang, Identity-Based Threshold Decryption, Public Key Cryptography – PKC 2004 (2004) ISBN:9783540210184 p.262-276, 10.1007/978-3-540-24632-9_19
  4. Boldyreva Alexandra, Goyal Vipul, Kumar Virendra, Identity-based encryption with efficient revocation, 10.1145/1455770.1455823
  5. Boneh Dan, Boyen Xavier, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Advances in Cryptology - EUROCRYPT 2004 (2004) ISBN:9783540219354 p.223-238, 10.1007/978-3-540-24676-3_14
  6. Boneh Dan, Boyen Xavier, Secure Identity Based Encryption Without Random Oracles, Advances in Cryptology – CRYPTO 2004 (2004) ISBN:9783540226680 p.443-459, 10.1007/978-3-540-28628-8_27
  7. Boneh, D., Ding, X., Tsudik, G., Wong, M.: A Method for Fast Revocation of Public Key Certificates and Security Capabilities. In: 10th USENIX Security Symposium, pp. 297–308 (2001)
  8. Boneh Dan, Franklin Matthew, Identity-Based Encryption from the Weil Pairing, 10.1137/s0097539701398521
  9. Boneh, D., Gentry, C., Hamburg, M.: Space-Efficient Identity-Based Encryption Without Pairings. In: FOCS 2007, pp. 647–657 (2007)
  10. Boneh Dan, Hamburg Michael, Generalized Identity Based and Broadcast Encryption Schemes, Advances in Cryptology - ASIACRYPT 2008 (2008) ISBN:9783540892540 p.455-470, 10.1007/978-3-540-89255-7_28
  11. Boneh Dan, Katz Jonathan, Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption, Lecture Notes in Computer Science (2005) ISBN:9783540243991 p.87-103, 10.1007/978-3-540-30574-3_8
  12. Boyen Xavier, Mei Qixiang, Waters Brent, Direct chosen ciphertext security from identity-based techniques, 10.1145/1102120.1102162
  13. Boyen, X.: A Tapestry of Identity-Based Encryption: Practical Frameworks Compared. Int. J. Applied Cryptography (IJACT) 1(1) (2008)
  14. Canetti Ran, Goldreich Oded, Halevi Shai, The random oracle methodology, revisited, 10.1145/1008731.1008734
  15. Canetti, R., Halevi, S., Katz, J.: A Forward-Secure Public-Key Encryption Scheme. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 254–271. Springer, Heidelberg (2003)
  16. Canetti Ran, Halevi Shai, Katz Jonathan, Chosen-Ciphertext Security from Identity-Based Encryption, Advances in Cryptology - EUROCRYPT 2004 (2004) ISBN:9783540219354 p.207-222, 10.1007/978-3-540-24676-3_13
  17. Canetti, R., Hohenberger, S.: Chosen-Ciphertext Secure Proxy Re-Encryption. In: ACM CCS 2007, pp. 185–194. ACM Press, New York (2007)
  18. Cocks Clifford, An Identity Based Encryption Scheme Based on Quadratic Residues, Cryptography and Coding (2001) ISBN:9783540430261 p.360-363, 10.1007/3-540-45325-3_32
  19. Cramer Ronald, Shoup Victor, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, Advances in Cryptology — CRYPTO '98 (1998) ISBN:9783540648925 p.13-25, 10.1007/bfb0055717
  20. Ding Xuhua, Tsudik Gene, Simple Identity-Based Cryptography with Mediated RSA, Topics in Cryptology — CT-RSA 2003 (2003) ISBN:9783540008477 p.193-210, 10.1007/3-540-36563-x_13
  21. Elwailly Farid F., Gentry Craig, Ramzan Zulfikar, QuasiModo: Efficient Certificate Validation and Revocation, Public Key Cryptography – PKC 2004 (2004) ISBN:9783540210184 p.375-388, 10.1007/978-3-540-24632-9_27
  22. Galindo David, A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption, Computational Science and Its Applications - ICCSA 2006 (2006) ISBN:9783540340751 p.318-326, 10.1007/11751595_35
  23. Gentry Craig, Silverberg Alice, Hierarchical ID-Based Cryptography, Lecture Notes in Computer Science (2002) ISBN:9783540001713 p.548-566, 10.1007/3-540-36178-2_34
  24. Gentry Craig, Practical Identity-Based Encryption Without Random Oracles, Advances in Cryptology - EUROCRYPT 2006 (2006) ISBN:9783540345466 p.445-464, 10.1007/11761679_27
  25. Goyal Vipul, Certificate Revocation Using Fine Grained Certificate Space Partitioning, Financial Cryptography and Data Security (2007) ISBN:9783540773658 p.247-259, 10.1007/978-3-540-77366-5_24
  26. Horwitz Jeremy, Lynn Ben, Toward Hierarchical Identity-Based Encryption, Advances in Cryptology — EUROCRYPT 2002 (2002) ISBN:9783540435532 p.466-481, 10.1007/3-540-46035-7_31
  27. Libert, B., Quisquater, J.-J.: Efficient revocation and threshold pairing based cryptosystems. In: PODC 2003, pp. 163–171. ACM Press, New York (2003)
  28. Libert Benoît, Vergnaud Damien, Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys, Public Key Cryptography – PKC 2009 (2009) ISBN:9783642004674 p.235-255, 10.1007/978-3-642-00468-1_14
  29. Micali, S.: Efficient Certificate Revocation. Technical Report MIT/LCS/TM-542-b (1996)
  30. Micali, S.: Novomodo: Scalable Certificate Validation and Simplified PKI Management. In: PKI Research Workshop (2002)
  31. Sahai Amit, Waters Brent, Fuzzy Identity-Based Encryption, Lecture Notes in Computer Science (2005) ISBN:9783540259107 p.457-473, 10.1007/11426639_27
  32. Shamir Adi, Identity-Based Cryptosystems and Signature Schemes, Advances in Cryptology ISBN:9783540156581 p.47-53, 10.1007/3-540-39568-7_5
  33. Waters Brent, Efficient Identity-Based Encryption Without Random Oracles, Lecture Notes in Computer Science (2005) ISBN:9783540259107 p.114-127, 10.1007/11426639_7