Affiliation:
1. NTT Information Sharing Platform Laboratories, NTT Corporation
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference16 articles.
1. [1] J. Baek, R. Safavi-Naini, and W. Susilo, “Efficient multi-receiver identity-based encryption and its application to broadcast encryption,” PKC 2005, pp.380-397, 2005.
2. [2] M. Bellare and P. Rogaway, “Entity authentication and key distribution,” CRYPTO 1993, pp.232-249, 1993.
3. [3] S. Blake-Wilson, D. Johnson, and A. Menezes, “Key agreement protocols and their security analysis,” IMA Int. Conf. 1997, pp.30-45, 1997.
4. [4] D. Boneh, X. Boyen, and E.-J. Goh, “Hierarchical identity based encryption with constant size ciphertext,” EUROCRYPT 2005, pp.440-456, 2005.
5. [5] C. Boyd and K.-K.R. Choo, “Security of two-party identity-based key agreement,” Mycrypt 2005, pp.229-243, 2005.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献