Identity-Based Encryption Protocols Using Bilinear Pairing
Identity-Based Encryption Protocols Using Bilinear Pairing
Identity-Based Encryption Protocols Using Bilinear Pairing
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Bibliography<br />
[1] Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja<br />
Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, and Haixia Shi. Searchable<br />
<strong>Encryption</strong> Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.<br />
In Victor Shoup, editor, CRYPTO, volume 3621 of Lecture Notes in Computer<br />
Science, pages 205–222. Springer, 2005.<br />
[2] Michel Abdalla, Mihir Bellare, and Phillip Rogaway. The Oracle Diffie-Hellman Assumptions<br />
and an Analysis of DHIES. In David Naccache, editor, CT-RSA, volume<br />
2020 of Lecture Notes in Computer Science, pages 143–158. Springer, 2001.<br />
[3] Nuttapong Attrapadung, Benoit Chevallier-Mames, Jun Furukawa, Takeshi Gomi,<br />
Goichiro Hanaoka, Hideki Imai, and Rui Zhang. Efficient <strong>Identity</strong>-<strong>Based</strong> <strong>Encryption</strong><br />
with Tight Security Reduction. Cryptology ePrint Archive, Report 2005/320, 2005.<br />
http://eprint.iacr.org/.<br />
[4] Joonsang Baek, Reihaneh Safavi-Naini, and Willy Susilo. Efficient Multi-receiver<br />
<strong>Identity</strong>-<strong>Based</strong> <strong>Encryption</strong> and Its Application to Broadcast <strong>Encryption</strong>. In Serge Vaudenay,<br />
editor, Public Key Cryptography, volume 3386 of Lecture Notes in Computer<br />
Science, pages 380–397. Springer, 2005.<br />
[5] Joonsang Baek and Yuliang Zheng. <strong>Identity</strong>-<strong>Based</strong> Threshold Decryption. In Feng Bao,<br />
Robert H. Deng, and Jianying Zhou, editors, Public Key Cryptography, volume 2947 of<br />
Lecture Notes in Computer Science, pages 262–276. Springer, 2004.<br />
[6] Paulo S. L. M. Barreto. <strong>Pairing</strong>-<strong>Based</strong> Crypto Lounge – A compendium of bilinear<br />
pairing related works . Available at:<br />
http://paginas.terra.com.br/informatica/paulobarreto/pblounge.html.<br />
[7] Paulo S. L. M. Barreto, Steven Galbraith, Colm O hEigeartaigh, and Michael Scott.<br />
Efficient <strong>Pairing</strong> Computation on Supersingular Abelian Varieties. Cryptology ePrint<br />
Archive, Report 2004/375, 2004. http://eprint.iacr.org/.<br />
[8] Paulo S. L. M. Barreto, Hae Yong Kim, Ben Lynn, and Michael Scott. Efficient Algorithms<br />
for <strong>Pairing</strong>-<strong>Based</strong> Cryptosystems. In Moti Yung, editor, CRYPTO, volume 2442<br />
of Lecture Notes in Computer Science, pages 354–368. Springer, 2002.<br />
129