Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
9
views
19
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,570
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Applied Cryptography and Network Security
Identity-Based Extractable Hash Proofs and Their Applications
other
Author(s):
Yu Chen
,
Zongyang Zhang
,
Dongdai Lin
,
Zhenfu Cao
Publication date
(Print):
2012
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Transnational Chinese identity
Most cited references
19
Record
: found
Abstract
: not found
Book Chapter
: not found
Identity-Based Cryptosystems and Signature Schemes
Adi Shamir
(1985)
0
comments
Cited
331
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Efficient Identity-Based Encryption Without Random Oracles
Brent Waters
(2005)
0
comments
Cited
153
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
An Identity Based Encryption Scheme Based on Quadratic Residues
Clifford Cocks
(2001)
0
comments
Cited
106
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2012
Pages
: 153-170
DOI:
10.1007/978-3-642-31284-7_10
SO-VID:
997f7b66-fec2-4761-af12-5bf2caa8c347
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Security Analysis of a Multi-factor Authenticated Key Exchange Protocol
pp. 12
Breaking an Animated CAPTCHA Scheme
pp. 30
Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens
pp. 48
RIKE: Using Revocable Identities to Support Key Escrow in PKIs
pp. 66
TreVisor
pp. 84
Authenticated Encryption: How Reordering Can Impact Performance
pp. 100
Length-Doubling Ciphers and Tweakable Ciphers
pp. 117
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers
pp. 135
Security Enhancements by OR-Proof in Identity-Based Identification
pp. 153
Identity-Based Extractable Hash Proofs and Their Applications
pp. 171
On Structural Signatures for Tree Data Structures
pp. 188
Inner-Product Lossy Trapdoor Functions and Applications
pp. 206
On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
pp. 224
Secure Accumulators from Euclidean Rings without Trusted Setup
pp. 241
Linear Fault Analysis of Block Ciphers
pp. 257
Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys
pp. 275
Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions
pp. 293
Zero-Value Point Attacks on Kummer-Based Cryptosystem
pp. 311
PICARO – A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance
pp. 329
Wide Collisions in Practice
pp. 344
A General Construction for 1-Round δ-RMT and (0, δ)-SMT
pp. 363
A Prefiltering Approach to Regular Expression Matching for Network Security Systems
pp. 381
iHTTP: Efficient Authentication of Non-confidential HTTP Traffic
pp. 400
ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches
pp. 418
Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations
pp. 436
The Shy Mayor: Private Badges in GeoSocial Networks
pp. 473
A New Framework for Privacy of RFID Path Authentication
pp. 489
GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol
pp. 507
Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud
pp. 526
SPICE – Simple Privacy-Preserving Identity-Management for Cloud Environment
pp. 544
A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring
Similar content
4,570
Cryptographic one-way hash function generation using twelve-terms 4d nonlinear system
Authors:
JQPro:Join Query Processing in a Distributed System for Big RDF Data Using the Hash-Merge Join Technique
Authors:
Nahla Mohammed Elzein
,
Mazlina Abdul Majid
,
Ibrahim Abaker Targio Hashem
…
Predicting Drug Targets from Heterogeneous Spaces using Anchor Graph Hashing and Ensemble Learning
Authors:
Y. ZHENG
,
H Peng
,
X Zhang
…
See all similar