[HTML][HTML] A survey of identity-based cryptography

J Baek, J Newmarch, R Safavi-Naini… - Proc. of Australian Unix …, 2004 - books.google.com
Proc. of Australian Unix Users Group Annual Conference, 2004books.google.com
In this paper, we survey the state of research on identity-based cryptography. We start from
reviewing the basic concepts of identity-based encryption and signature schemes, and
subsequently review some important identity-based cryptographic schemes based on the
bilinear pairing, a computational primitive widely used to build up various identity-based
cryptographic schemes in the current literature. We also survey the cryptographic schemes
such as a" certificate-based encryption scheme" and a" public key encryption scheme with
Abstract
In this paper, we survey the state of research on identity-based cryptography. We start from reviewing the basic concepts of identity-based encryption and signature schemes, and subsequently review some important identity-based cryptographic schemes based on the bilinear pairing, a computational primitive widely used to build up various identity-based cryptographic schemes in the current literature. We also survey the cryptographic schemes such as a" certificate-based encryption scheme" and a" public key encryption scheme with
books.google.com
以上显示的是最相近的搜索结果。 查看全部搜索结果