Pairing-based public-key encryption schemes with backward-and-forward security

被引:0
|
作者
DEBI Institute, Curtin Business School, Curtin University of Technology, GPO Box U1987, WA 6845, Australia [1 ]
机构
来源
Comput Syst Sci Eng | 2008年 / 1卷 / 3-8期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Pairing-based public-key encryption schemes with backward-and-forward security
    Han, Song
    Chang, Elizabeth
    Dillon, Tharam
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2008, 23 (01): : 3 - 8
  • [2] Pairing-based public-key encryption schemes with backward-and-forward security
    Han, Song
    Chang, Elizabeth
    Dillon, Tharam
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2008, 23 (04): : 303 - 308
  • [3] On the security notions for public-key encryption schemes
    Phan, DH
    Pointcheval, D
    SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 33 - 46
  • [4] A refined definition of semantic security for public-key encryption schemes
    Sakai, H
    Nakamura, N
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2001, E84D (01): : 34 - 39
  • [5] Selective opening security of practical public-key encryption schemes
    Heuer, Felix
    Jager, Tibor
    Schaege, Sven
    Kiltz, Eike
    IET INFORMATION SECURITY, 2016, 10 (06) : 304 - 318
  • [6] On the Selective Opening Security of Practical Public-Key Encryption Schemes
    Heuer, Felix
    Jager, Tibor
    Kiltz, Eike
    Schaege, Sven
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 27 - 51
  • [7] Relations among notions of security for public-key encryption schemes
    Bellare, M
    Desai, A
    Pointcheval, D
    Rogaway, P
    ADVANCES IN CRYPTOLOGY - CRYPTO'98, 1998, 1462 : 26 - 45
  • [8] On the security of hybrid public-key encryption
    Nagao, W
    Manabe, Y
    Okamoto, T
    ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, : 28 - 33
  • [9] Quantum public-key encryption schemes based on conjugate coding
    Yang, Li
    Yang, Biyao
    Xiang, Chong
    QUANTUM INFORMATION PROCESSING, 2020, 19 (11)
  • [10] On the Security of Two Pairing-Based Signature Schemes
    Behnia, Rouzbeh
    Tan, Syh-Yuan
    Heng, Swee-Huay
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,