Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,199,007 papers from all fields of science
Search
Sign In
Create Free Account
Certificate-based encryption
Certificate-based encryption is a system in which a certificate authority uses ID-based cryptography to produce a certificate. This system gives the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Certificate authority
Denial-of-service attack
ID-based cryptography
ID-based encryption
Expand
Broader (2)
E-commerce
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments
Yuh-Min Tseng
,
Jui-Di Wu
,
Ruo-Wei Hung
,
Hung-Yu Chien
International Conference on Awareness Science and…
2018
Corpus ID: 53622422
Now, Internet of Things (IoT) brings people innovative experiences and applications through connectivity of numerous computing…
Expand
2016
2016
Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record
Clémentine Gritti
,
W. Susilo
,
T. Plantard
Journal of Internet Services and Information…
2016
Corpus ID: 6482733
In an e-Health scenario, we study how the practitioners are authorized when they are requesting access to medical documents…
Expand
2014
2014
A new certificate-based digital signature scheme in bilinear group
Jianglang Feng
,
Jindong Li
International Journal of Embedded Systems
2014
Corpus ID: 38256396
Certificate-based signature preserves advantages of implicit certification and no private key escrow as the certificate-based…
Expand
2013
2013
Certificate-Based Proxy Re-encryption for Public Cloud Storage
Chul Sur
,
Youngho Park
,
Sanguk Shin
,
K. Rhee
,
Changho Seo
Seventh International Conference on Innovative…
2013
Corpus ID: 17073341
Recently cloud computing paradigm has increasingly become a new model in which a shared pool of configurable computing resources…
Expand
2013
2013
A Distributed Approach of a Threshold Certificate-Based Encryption Scheme with No Trusted Entities
A. Fournaris
Information Security Journal
2013
Corpus ID: 40108933
ABSTRACT The distributed paradigm as manifested in distributed networks, calls for a different way from the traditional client…
Expand
2013
2013
CONSTRUCTING PAIRING-FREE CERTIFICATE-BASED ENCRYPTION
Yang Lu
,
Jiguo Li
2013
Corpus ID: 26584512
Certificate-based cryptography is a new paradigm that combines traditional public-key cryptography and identity-based…
Expand
2013
2013
A New Certificate-Based Digital Signature Scheme
Jianglang Feng
,
Jindong Li
Fourth International Conference on Emerging…
2013
Corpus ID: 2428970
Certificate-based signature preserves advantages of implicit certification and no private key escrow as the certificate-based…
Expand
2012
2012
Enabling z-Filter updates for self-routing denial-of-service resistant capabilities
B. Alzahrani
,
M. Reed
,
V. Vassilakis
Computer Science and Electronic Engineering…
2012
Corpus ID: 14837601
Secure in-packet Bloom filters is an approach used to securely forward source routing packets with small forwarding tables making…
Expand
2010
2010
Constructing efficient certificate-based encryption scheme with pairing in the standard model
Yang Lu
,
Jiguo Li
IEEE International Conference on Information…
2010
Corpus ID: 18784177
Certificate-based encryption (CBE) is a new asymmetric encryption paradigm which combines traditional public-key encryption (PKE…
Expand
2008
2008
A Certificate-Based Signcryption Scheme
Ming Luo
,
Yingyou Wen
,
Hong Zhao
International Conference on Computer Science and…
2008
Corpus ID: 896496
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption, which combines traditional pubic key encryption…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE