11.07.2014 Views

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

Identity-Based Encryption Protocols Using Bilinear Pairing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

[43] Gerhard Frey, Michael Müller, and Hans-Georg Rück. The Tate <strong>Pairing</strong> and the Discrete<br />

Logarithm Applied to Elliptic Curve Cryptosystems. IEEE Transactions on Information<br />

Theory, 45(5):1717–1719, 1999.<br />

[44] Eiichiro Fujisaki and Tatsuaki Okamoto. Secure Integration of Asymmetric and Symmetric<br />

<strong>Encryption</strong> Schemes. In Michael J. Wiener, editor, CRYPTO, volume 1666 of<br />

Lecture Notes in Computer Science, pages 537–554. Springer, 1999.<br />

[45] Steven D. Galbraith, Keith Harrison, and David Soldera. Implementing the Tate <strong>Pairing</strong>.<br />

In Claus Fieker and David R. Kohel, editors, ANTS, volume 2369 of Lecture Notes<br />

in Computer Science, pages 324–337. Springer, 2002.<br />

[46] David Galindo. The Exact Security of <strong>Pairing</strong> <strong>Based</strong> <strong>Encryption</strong> and Signature Schemes.<br />

<strong>Based</strong> on a talk at Workshop on Provable Security, INRIA, Paris, 2004. Available from<br />

author’s website.<br />

[47] David Galindo. Boneh-Franklin <strong>Identity</strong> <strong>Based</strong> <strong>Encryption</strong> Revisited. In Luís Caires,<br />

Giuseppe F. Italiano, Luís Monteiro, Catuscia Palamidessi, and Moti Yung, editors,<br />

ICALP, volume 3580 of Lecture Notes in Computer Science, pages 791–802. Springer,<br />

2005.<br />

[48] Craig Gentry. Practical <strong>Identity</strong>-<strong>Based</strong> <strong>Encryption</strong> Without Random Oracles. In Serge<br />

Vaudenay, editor, EUROCRYPT, volume 4004 of Lecture Notes in Computer Science,<br />

pages 445–464. Springer, 2006.<br />

[49] Craig Gentry and Alice Silverberg. Hierarchical ID-<strong>Based</strong> Cryptography. In Yuliang<br />

Zheng, editor, ASIACRYPT, volume 2501 of Lecture Notes in Computer Science, pages<br />

548–566. Springer, 2002.<br />

[50] Shafi Goldwasser and Silvio Micali. Probabilistic <strong>Encryption</strong>. J. Comput. Syst. Sci.,<br />

28(2):270–299, 1984.<br />

[51] Robert Granger, Dan Page, and Nigel Smart. High Security <strong>Pairing</strong>-based Cryptography<br />

Revisited. In Alcherio Martinoli, Riccardo Poli, and Thomas Stuetzle, editors, ANTS,<br />

volume 4096 of Lecture Notes in Computer Science, pages 480–494. Springer, 2006.<br />

[52] Robert Granger, Dan Page, and Martijn Stam. On Small Characteristic Algebraic Tori<br />

in <strong>Pairing</strong> <strong>Based</strong> Cryptography. LMS J. Comput. and Math., 9:64–85, 2006.<br />

[53] Darrel Hankerson, Alfred Menezes, and Scott Vanstone. Guide to Elliptic Curve Cryptography.<br />

Springer, 2004.<br />

[54] Florian Hess. Efficient <strong>Identity</strong> <strong>Based</strong> Signature Schemes <strong>Based</strong> on <strong>Pairing</strong>s. In Kaisa<br />

Nyberg and Howard M. Heys, editors, Selected Areas in Cryptography, volume 2595 of<br />

Lecture Notes in Computer Science, pages 310–324. Springer, 2002.<br />

133

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!