ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Extended BB84 Protocol Using Lucas Series and Identity Based Encryption
Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1 - Smart Innovation, Systems and Technologies
◽
10.1007/978-3-319-63673-3_10
◽
2017
◽
pp. 80-85
Author(s):
AmrinBanu M. Shaikh
◽
Parth D. Shah
Keyword(s):
Bb84 Protocol
◽
Identity Based Encryption
◽
Identity Based
Start Chat
Download Full-text
Related Documents
Cited By
References
Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
◽
10.1587/transfun.e94.a.45
◽
2011
◽
Vol E94-A
(1)
◽
pp. 45-56
◽
Cited By ~ 6
Author(s):
Jae Hong SEO
◽
Tetsutaro KOBAYASHI
◽
Miyako OHKUBO
◽
Koutarou SUZUKI
Keyword(s):
Identity Based Encryption
◽
Identity Based
Start Chat
Download Full-text
Jhanwar-Barua’s Identity-Based Encryption Revisited
Network and System Security - Lecture Notes in Computer Science
◽
10.1007/978-3-319-11698-3_21
◽
2014
◽
pp. 271-284
◽
Cited By ~ 5
Author(s):
Ibrahim Elashry
◽
Yi Mu
◽
Willy Susilo
Keyword(s):
Identity Based Encryption
◽
Identity Based
Start Chat
Download Full-text
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
Advances in Cryptology – ASIACRYPT 2007 - Lecture Notes in Computer Science
◽
10.1007/978-3-540-76900-2_16
◽
2007
◽
pp. 265-282
◽
Cited By ~ 70
Author(s):
Matthew Green
◽
Susan Hohenberger
Keyword(s):
Oblivious Transfer
◽
Identity Based Encryption
◽
Identity Based
Start Chat
Download Full-text
An Authentication Scheme Using Identity-based Encryption & Blockchain
2018 IEEE Symposium on Computers and Communications (ISCC)
◽
10.1109/iscc.2018.8538446
◽
2018
◽
Cited By ~ 5
Author(s):
Beini Zhou
◽
Hui Li
◽
Li Xu
Keyword(s):
Authentication Scheme
◽
Identity Based Encryption
◽
Identity Based
Start Chat
Download Full-text
Identity-based encryption with outsourced equality test in cloud computing
Information Sciences
◽
10.1016/j.ins.2015.08.053
◽
2016
◽
Vol 328
◽
pp. 389-402
◽
Cited By ~ 57
Author(s):
Sha Ma
Keyword(s):
Cloud Computing
◽
Identity Based Encryption
◽
Identity Based
◽
Equality Test
Start Chat
Download Full-text
Practical identity-based encryption in multiple private key generator (PKG) environments
Security and Communication Networks
◽
10.1002/sec.743
◽
2013
◽
Vol 8
(1)
◽
pp. 43-50
◽
Cited By ~ 1
Author(s):
Shengbao Wang
◽
Zhenfu Cao
◽
Qi Xie
◽
Wenhao Liu
Keyword(s):
Practical Identity
◽
Private Key
◽
Identity Based Encryption
◽
Identity Based
Start Chat
Download Full-text
A Survey on Identity-Based Encryption from Lattices
Mathematical Modelling for Next-Generation Cryptography - Mathematics for Industry
◽
10.1007/978-981-10-5065-7_19
◽
2017
◽
pp. 349-365
◽
Cited By ~ 1
Author(s):
Goichiro Hanaoka
◽
Shota Yamada
Keyword(s):
Identity Based Encryption
◽
Identity Based
Start Chat
Download Full-text
Compact identity-based encryption without strong symmetric cipher
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11
◽
10.1145/1966913.1966923
◽
2011
◽
Cited By ~ 2
Author(s):
Joonsang Baek
◽
Jianying Zhou
Keyword(s):
Identity Based Encryption
◽
Identity Based
Start Chat
Download Full-text
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition
Computer Security – ESORICS 2020 - Lecture Notes in Computer Science
◽
10.1007/978-3-030-59013-0_4
◽
2020
◽
pp. 65-85
Author(s):
Goichiro Hanaoka
◽
Misaki Komatsu
◽
Kazuma Ohara
◽
Yusuke Sakai
◽
Shota Yamada
Keyword(s):
Identity Based Encryption
◽
Identity Based
◽
Definition Of
◽
Semantic Definition
Start Chat
Download Full-text
Cocks’ Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper)
Advances in Information and Computer Security - Lecture Notes in Computer Science
◽
10.1007/978-3-030-26834-3_16
◽
2019
◽
pp. 273-283
Author(s):
Xin Wang
◽
Shimin Li
◽
Rui Xue
Keyword(s):
Standard Model
◽
Short Paper
◽
Identity Based Encryption
◽
The Standard Model
◽
Identity Based
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close