Pairing-based public-key encryption schemes with backward-and-forward security
Identity-based cryptosystems utilize some arbitrary strings as the participants' public key in the underlying system. The encryptioner will not need to obtain the decryptioner's certificate. That will simplify the certificate management. Therefore, it is still interesting to propose som...
Main Authors: | Han, Song, Chang, Elizabeth, Dillon, Tharam S. |
---|---|
Format: | Journal Article |
Published: |
CRL Publishers
2008
|
Subjects: | |
Online Access: | http://www.crlpublishing.co.uk/journal.asp?j=csse&s=Vol 23 2008 http://hdl.handle.net/20.500.11937/20535 |
Similar Items
-
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005) -
Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
by: Guillaume Endignoux, et al.
Published: (2017-02-01) -
Speech encryption using chaotic shift keying for secured speech communication
by: P. Sathiyamurthi, et al.
Published: (2017-09-01) -
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009) -
Mediated Encryption: Analysis and Design
by: I. Elashry1, et al.
Published: (2015-01-01)