Pairing-based public-key encryption schemes with backward-and-forward security

被引:0
|
作者
DEBI Institute, Curtin Business School, Curtin University of Technology, GPO Box U1987, WA 6845, Australia [1 ]
机构
来源
Comput Syst Sci Eng | 2008年 / 1卷 / 3-8期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Further analysis of pairing-based traitor tracing schemes for broadcast encryption
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) : 28 - 32
  • [32] Provably secure public-key encryption schemes: EPOC and PSEC
    Okamoto, Tatsuaki
    Fujisaki, Eiichiro
    Uchiyama, Shigenori
    NTT R and D, 1999, 48 (10): : 740 - 749
  • [33] Pairing-free public-key authenticated encryption with keyword search
    Bai, Lisha
    Yong, Lei
    Chen, Zhixian
    Shao, Jun
    COMPUTER STANDARDS & INTERFACES, 2024, 88
  • [34] A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks
    Chen, Biwen
    Wu, Libing
    Wang, Huaqun
    Zhou, Lu
    He, Debiao
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) : 5813 - 5825
  • [35] Public-Key Encryption Based on Chebyshev Polynomials
    L. Kocarev
    J. Makraduli
    P. Amato
    Circuits, Systems and Signal Processing, 2005, 24 : 497 - 517
  • [36] Public-key encryption based on Chebyshev maps
    Kocarev, L
    Tasev, Z
    PROCEEDINGS OF THE 2003 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III: GENERAL & NONLINEAR CIRCUITS AND SYSTEMS, 2003, : 28 - 31
  • [37] Public-key encryption based on Chebyshev polynomials
    Kocarev, L
    Makraduli, J
    Amato, P
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2005, 24 (05) : 497 - 517
  • [38] Security-enhanced public-key authenticated searchable encryption
    Cheng, Leixiao
    Qin, Jing
    Feng, Feng
    Meng, Fei
    INFORMATION SCIENCES, 2023, 647
  • [39] How to enhance the security of public-key encryption at minimum cost
    Fujisaki, E
    Okamoto, T
    PUBLIC KEY CRYPTOGRAPHY, 1999, 1560 : 53 - 68
  • [40] Selectively chosen ciphertext security in threshold public-key encryption
    Kim, Kitak
    Park, Jong Hwan
    Lee, Dong Hoon
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (03) : 189 - 200