Identity-based encryption comes of age

被引:1
作者
Martin, Luther
机构
关键词
Conferences; Cryptography; Identity-based encryption; NIST; NIST workshop; Public key; Public-key technology; Security; Servers; Technological innovation;
D O I
10.1109/MC.2008.299
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Public-key technology is due for another round of useful innovations. © 2008 IEEE.
引用
收藏
页码:93 / 95
页数:3
相关论文
共 50 条
  • [31] Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems
    Liu, Zi-Yuan
    Tseng, Yi-Fan
    Tso, Raylin
    Chen, Yu-Chi
    Mambo, Masahiro
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4629 - 4640
  • [32] An Improved Identity-Based Encryption Scheme without Bilinear Map
    Zheng, Minghui
    Zhou, Huihua
    Cui, Guohua
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 374 - 377
  • [33] Key updating technique in identity-based encryption
    Liu, Shengli
    Long, Yu
    Chen, Kefei
    [J]. INFORMATION SCIENCES, 2011, 181 (11) : 2436 - 2440
  • [34] Relations between semantic security and anonymity in identity-based encryption
    Herranz, Javier
    Laguillaumie, Fabien
    Rafols, Carla
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 453 - 460
  • [35] Identity-based Broadcast Encryption with Shorter Transmissions
    张乐友
    胡予濮
    牟宁波
    [J]. JournalofShanghaiJiaotongUniversity(Science), 2008, 13 (06) : 641 - 645
  • [36] Wildcarded identity-based encryption from lattices
    Minh Thuy Truc Pham
    Ngoc Ai Van Nguyen
    Jiang, Mei
    Dung Hoang Duong
    Susilo, Willy
    [J]. THEORETICAL COMPUTER SCIENCE, 2022, 902 : 41 - 53
  • [37] Cryptographic Reverse Firewalls for Identity-Based Encryption
    Zhou, Yuyang
    Guan, Yuanfeng
    Zhang, Zhiwei
    Li, Fagen
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 36 - 52
  • [38] Efficient Identity-Based Encryption from LWR
    Cheon, Jung Hee
    Cho, Haejin
    Jung, Jaewook
    Lee, Joohee
    Lee, Keewoo
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 225 - 241
  • [39] On Anonymization of Cocks' Identity-based Encryption Scheme
    Nica, Anca-Maria
    Tiplea, Ferucio Laurentiu
    [J]. COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2019, 27 (03) : 283 - 298
  • [40] Identity-Based Encryption with Verifiable Outsourced Revocation
    Ren, Yanli
    Ding, Ning
    Zhang, Xinpeng
    Lu, Haining
    Gu, Dawu
    [J]. COMPUTER JOURNAL, 2016, 59 (11) : 1659 - 1668