Skip to search formSkip to main contentSkip to account menu

Certificate-based encryption

Certificate-based encryption is a system in which a certificate authority uses ID-based cryptography to produce a certificate. This system gives the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Now, Internet of Things (IoT) brings people innovative experiences and applications through connectivity of numerous computing… 
2016
2016
In an e-Health scenario, we study how the practitioners are authorized when they are requesting access to medical documents… 
2014
2014
Certificate-based signature preserves advantages of implicit certification and no private key escrow as the certificate-based… 
2014
2014
Some attacks which can get some key information from the cryptosystem break the security of the entire cryptosystem. How to… 
2013
2013
Certificate-based cryptography is a new paradigm that combines traditional public-key cryptography and identity-based… 
2013
2013
ABSTRACT The distributed paradigm as manifested in distributed networks, calls for a different way from the traditional client… 
2013
2013
Certificate-based signature preserves advantages of implicit certification and no private key escrow as the certificate-based… 
2012
2012
Secure in-packet Bloom filters is an approach used to securely forward source routing packets with small forwarding tables making… 
2009
2009
We newly propose a multiple and unlinkable identity-based public key encryption scheme which allows the use of a various number… 
2008
2008
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption, which combines traditional pubic key encryption…