Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
9
views
9
references
Top references
cited by
6
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,250
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Automata, Languages and Programming
Boneh-Franklin Identity Based Encryption Revisited
other
Author(s):
David Galindo
Publication date
(Print):
2005
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Transnational Chinese identity
Most cited references
9
Record
: found
Abstract
: not found
Book Chapter
: not found
Identity-Based Cryptosystems and Signature Schemes
Adi Shamir
(1985)
0
comments
Cited
332
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Certificateless Public Key Cryptography
Sattam S. Al-Riyami
,
Kenneth G. Paterson
(2003)
0
comments
Cited
106
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Hierarchical ID-Based Cryptography
Craig Gentry
,
Alice Silverberg
(2002)
0
comments
Cited
93
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2005
Pages
: 791-802
DOI:
10.1007/11523468_64
SO-VID:
7fc2d9ad-e4fa-4a70-adfe-31ee2feb6290
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 16
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic
pp. 791
Boneh-Franklin Identity Based Encryption Revisited
pp. 956
Approximating Max kCSP – Outperforming a Random Assignment with Almost a Linear Factor
pp. 153
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
pp. 191
Measure and Conquer: Domination – A Case Study
pp. 249
Replacement Paths and k Simple Shortest Paths in Unweighted Directed Graphs
pp. 261
Deterministic Constructions of Approximate Distance Oracles and Spanners
pp. 347
On the Wake-Up Problem in Radio Networks
pp. 513
Weighted Automata and Weighted Logics
pp. 589
Simulated Annealing Beats Metropolis in Combinatorial Optimization
pp. 627
Reordering Buffer Management for Non-uniform Cost Models
pp. 677
On the Cover Time of Random Geometric Graphs
pp. 779
Completely Non-malleable Schemes
pp. 803
Single-Database Private Information Retrieval with Constant Communication Rate
pp. 878
The Complexity of Stochastic Rabin and Streett Games
pp. 1018
An Accessible Approach to Behavioural Pseudometrics
pp. 1043
A Better Approximation Ratio for the Vertex Cover Problem
pp. 1089
Decidability and Complexity Results for Timed Automata via Channel Machines
pp. 1102
Congruences for Visibly Pushdown Languages
pp. 1115
Approximation Algorithms for Euclidean Group TSP
pp. 1202
A Fully Abstract Encoding of the π-Calculus with Data Terms
pp. 1349
The Polyranking Principle
pp. 1450
Unsafe Grammars and Panic Automata
Similar content
3,250
The mouse brain in stereotaxic coordinates-(Deluxe) by Paxinos G. and Franklin, KBJ, Academic Press, New York, 2001
Authors:
J.-P. Konsman
2017 Benjamin Franklin Medal in Chemistry presented to Krzysztof Matyjaszewski, Ph.D. and Mitsuo Sawamoto, Ph.D.
Authors:
Reconnaissance U-Pb geochronology of the crystalline core of the Boothia Uplift, District of Franklin, Northwest Territories
Authors:
T Frisch
,
P Hunt
See all similar
Cited by
6
Non-Interactive Key Exchange
Authors:
Eduarda Freire
,
Dennis Hofheinz
,
Eike Kiltz
…
Security Proof of Sakai-Kasahara’s Identity-Based Encryption Scheme
Authors:
Liqun Chen
,
Zhaohui Cheng
Removing Escrow from Identity-Based Encryption
Authors:
Sherman Chow
See all cited by