A key agreement protocol based on Identity-Based Proxy Re-encryption (original) (raw)
Related papers
Time-and-Identity based Proxy Re-encryption Scheme
2014
Foretaste on identity based encryption
IJARIIT-Volume 5 issue 3, 2019
An Efficient Two-Party Identity-Based Key Exchange Protocol
Informatica
Identity - Based Multiple Key Agreement Scheme
KSII Transactions on Internet and Information Systems
Advance Applications of Identity Based Encryption
An Improvement of an Identity-Based Key Issuing Protocol
2008
Identity based Proxy Re-Encryption using Forward Security in Cloud Framework
2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA)
2021
Identity-based encryption with efficient revocation
2008
Inter-domain Identity-Based Proxy Re-encryption
Lecture Notes in Computer Science, 2009
Fully Secure Accountable-Authority Identity-Based Encryption
Lecture Notes in Computer Science, 2011
A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme
Provable Security
Backward Compatible Identity-Based Encryption
Sensors
Security and Communication Networks, 2020
A New Two-Party Identity-Based Authenticated Key Agreement
2005
An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol
Int. J. Netw. Secur., 2015
Efficient identity-based key encapsulation to multiple parties
2005
Efficient Identity-Based Encryption used in Cloud Computing
IJSTE - International Journal of Science Technology and Engineering
Computer Networks, 2012
Identity Based Encryption Without Redundancy
Lecture Notes in Computer Science, 2005
V-BIBE: A New Identity Based Encryption Scheme
IAEME PUBLICATION, 2018
Mergeable and Revocable Identity-Based Encryption
Lecture Notes in Computer Science, 2017
IJERT-A Unified Hybrid ID-based And Certificate based Cryptosystem For Information Security
International Journal of Engineering Research and Technology (IJERT), 2014
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
Lecture Notes in Computer Science, 2005
An IBE Scheme to Exchange Authenticated Secret Keys
2004
IEEE Access, 2021
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
Theoretical Computer Science, 2009
ijmer.com
IBE Based Group Key Agreement Protocols
On Use of Identity-Based Encryption for Secure Emailing
Proceedings of the International Conference on Security and Cryptography