A key agreement protocol based on Identity-Based Proxy Re-encryption (original) (raw)

Time-and-Identity based Proxy Re-encryption Scheme

Kambombo Mtonga

2014

View PDFchevron_right

Foretaste on identity based encryption

ashish tripathi

IJARIIT-Volume 5 issue 3, 2019

View PDFchevron_right

An Efficient Two-Party Identity-Based Key Exchange Protocol

Yuh-Min Tseng

Informatica

View PDFchevron_right

Identity - Based Multiple Key Agreement Scheme

Massoud H Dehkordi

KSII Transactions on Internet and Information Systems

View PDFchevron_right

Advance Applications of Identity Based Encryption

Mehdi Hussain

View PDFchevron_right

An Improvement of an Identity-Based Key Issuing Protocol

tack wei chen

2008

View PDFchevron_right

Identity based Proxy Re-Encryption using Forward Security in Cloud Framework

Jyoti Raghatwan

2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA)

View PDFchevron_right

Improved Identity Based Encryption System (IIBES): A Mechanism for Eliminating the Key-Escrow Problem

Maitri Patel

2021

View PDFchevron_right

Identity-based encryption with efficient revocation

Vipul Goyal

2008

View PDFchevron_right

Inter-domain Identity-Based Proxy Re-encryption

Willem Jonker

Lecture Notes in Computer Science, 2009

View PDFchevron_right

Fully Secure Accountable-Authority Identity-Based Encryption

Hakan Seyalioglu

Lecture Notes in Computer Science, 2011

View PDFchevron_right

A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme

Varshika Srinivasavaradhan

Provable Security

View PDFchevron_right

Backward Compatible Identity-Based Encryption

Jongkil Kim

Sensors

View PDFchevron_right

A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing

Ravi Sankar

Security and Communication Networks, 2020

View PDFchevron_right

A New Two-Party Identity-Based Authenticated Key Agreement

J.m. Barreto

2005

View PDFchevron_right

An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol

Siva Ranjani

Int. J. Netw. Secur., 2015

View PDFchevron_right

Efficient identity-based key encapsulation to multiple parties

Manuel Barbosa

2005

View PDFchevron_right

Efficient Identity-Based Encryption used in Cloud Computing

IJSTE - International Journal of Science Technology and Engineering

View PDFchevron_right

A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants

Yuh-Min Tseng

Computer Networks, 2012

View PDFchevron_right

Identity Based Encryption Without Redundancy

Jean-jacques Quisquater

Lecture Notes in Computer Science, 2005

View PDFchevron_right

V-BIBE: A New Identity Based Encryption Scheme

IAEME Publication

IAEME PUBLICATION, 2018

View PDFchevron_right

International Journal of Ethics in Engineering & Management Education Identity-Based Secure Distributed Data Storage Schemes

Amit Kumar

View PDFchevron_right

Mergeable and Revocable Identity-Based Encryption

Willy Susilo

Lecture Notes in Computer Science, 2017

View PDFchevron_right

IJERT-A Unified Hybrid ID-based And Certificate based Cryptosystem For Information Security

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2014

View PDFchevron_right

Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application

Hideki Imai

Lecture Notes in Computer Science, 2005

View PDFchevron_right

An IBE Scheme to Exchange Authenticated Secret Keys

Waldyr Benits

2004

View PDFchevron_right

A Novel Revocable and Identity-Based Conditional Proxy Re-Encryption Scheme With Ciphertext Evolution for Secure Cloud Data Sharing

Inho Ra

IEEE Access, 2021

View PDFchevron_right

Direct chosen-ciphertext secure identity-based key encapsulation without random oracles

David Galindo

Theoretical Computer Science, 2009

View PDFchevron_right

A New Scheme for Key Exchange

Debajit Sensarma

ijmer.com

View PDFchevron_right

IBE Based Group Key Agreement Protocols

Göran Pulkkis, Timo Karvi

View PDFchevron_right

On Use of Identity-Based Encryption for Secure Emailing

Chunming Rong

Proceedings of the International Conference on Security and Cryptography

View PDFchevron_right