11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Bibliography<br />

[1] Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja<br />

Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, and Haixia Shi. Searchable<br />

<strong>Encryption</strong> Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.<br />

In Victor Shoup, editor, CRYPTO, volume 3621 of Lecture Notes in Computer<br />

Science, pages 205–222. Springer, 2005.<br />

[2] Michel Abdalla, Mihir Bellare, and Phillip Rogaway. The Oracle Diffie-Hellman Assumptions<br />

and an Analysis of DHIES. In David Naccache, editor, CT-RSA, volume<br />

2020 of Lecture Notes in Computer Science, pages 143–158. Springer, 2001.<br />

[3] Nuttapong Attrapadung, Benoit Chevallier-Mames, Jun Furukawa, Takeshi Gomi,<br />

Goichiro Hanaoka, Hideki Imai, and Rui Zhang. Efficient <strong>Identity</strong>-<strong>Based</strong> <strong>Encryption</strong><br />

with Tight Security Reduction. Cryptology ePrint Archive, Report 2005/320, 2005.<br />

http://eprint.iacr.org/.<br />

[4] Joonsang Baek, Reihaneh Safavi-Naini, and Willy Susilo. Efficient Multi-receiver<br />

<strong>Identity</strong>-<strong>Based</strong> <strong>Encryption</strong> and Its Application to Broadcast <strong>Encryption</strong>. In Serge Vaudenay,<br />

editor, Public Key Cryptography, volume 3386 of Lecture Notes in Computer<br />

Science, pages 380–397. Springer, 2005.<br />

[5] Joonsang Baek and Yuliang Zheng. <strong>Identity</strong>-<strong>Based</strong> Threshold Decryption. In Feng Bao,<br />

Robert H. Deng, and Jianying Zhou, editors, Public Key Cryptography, volume 2947 of<br />

Lecture Notes in Computer Science, pages 262–276. Springer, 2004.<br />

[6] Paulo S. L. M. Barreto. <strong>Pairing</strong>-<strong>Based</strong> Crypto Lounge – A compendium of bilinear<br />

pairing related works . Available at:<br />

http://paginas.terra.com.br/informatica/paulobarreto/pblounge.html.<br />

[7] Paulo S. L. M. Barreto, Steven Galbraith, Colm O hEigeartaigh, and Michael Scott.<br />

Efficient <strong>Pairing</strong> Computation on Supersingular Abelian Varieties. Cryptology ePrint<br />

Archive, Report 2004/375, 2004. http://eprint.iacr.org/.<br />

[8] Paulo S. L. M. Barreto, Hae Yong Kim, Ben Lynn, and Michael Scott. Efficient Algorithms<br />

for <strong>Pairing</strong>-<strong>Based</strong> Cryptosystems. In Moti Yung, editor, CRYPTO, volume 2442<br />

of Lecture Notes in Computer Science, pages 354–368. Springer, 2002.<br />

129

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!