Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,088,300 papers from all fields of science
Search
Sign In
Create Free Account
Certificate-based encryption
Certificate-based encryption is a system in which a certificate authority uses ID-based cryptography to produce a certificate. This system gives the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Certificate authority
Denial-of-service attack
ID-based cryptography
ID-based encryption
Expand
Broader (2)
E-commerce
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record
Clémentine Gritti
,
W. Susilo
,
T. Plantard
Journal of Internet Services and Information…
2016
Corpus ID: 6482733
In an e-Health scenario, we study how the practitioners are authorized when they are requesting access to medical documents…
Expand
2014
2014
A new certificate-based digital signature scheme in bilinear group
Jianglang Feng
,
Jindong Li
International Journal of Embedded Systems
2014
Corpus ID: 38256396
Certificate-based signature preserves advantages of implicit certification and no private key escrow as the certificate-based…
Expand
2013
2013
Certificate-Based Proxy Re-encryption for Public Cloud Storage
Chul Sur
,
Youngho Park
,
Sanguk Shin
,
K. Rhee
,
Changho Seo
Seventh International Conference on Innovative…
2013
Corpus ID: 17073341
Recently cloud computing paradigm has increasingly become a new model in which a shared pool of configurable computing resources…
Expand
2013
2013
CONSTRUCTING PAIRING-FREE CERTIFICATE-BASED ENCRYPTION
Yang Lu
,
Jiguo Li
2013
Corpus ID: 26584512
Certificate-based cryptography is a new paradigm that combines traditional public-key cryptography and identity-based…
Expand
2013
2013
A Distributed Approach of a Threshold Certificate-Based Encryption Scheme with No Trusted Entities
A. Fournaris
Information Security Journal
2013
Corpus ID: 40108933
ABSTRACT The distributed paradigm as manifested in distributed networks, calls for a different way from the traditional client…
Expand
2013
2013
A New Certificate-Based Digital Signature Scheme
Jianglang Feng
,
Jindong Li
Fourth International Conference on Emerging…
2013
Corpus ID: 2428970
Certificate-based signature preserves advantages of implicit certification and no private key escrow as the certificate-based…
Expand
2012
2012
Enabling z-Filter updates for self-routing denial-of-service resistant capabilities
B. Alzahrani
,
M. Reed
,
V. Vassilakis
Computer Science and Electronic Engineering…
2012
Corpus ID: 14837601
Secure in-packet Bloom filters is an approach used to securely forward source routing packets with small forwarding tables making…
Expand
2009
2009
Generic Construction of Certificate-Based Encryption in the Standard Model
Yang Lu
,
Jiguo Li
Second International Symposium on Electronic…
2009
Corpus ID: 16949668
Certificate-based encryption (CBE) is a new asymmetric encryption paradigm which combines public-key encryption (PKE) and…
Expand
2008
2008
A Certificate-Based Signcryption Scheme
Ming Luo
,
Yingyou Wen
,
Hong Zhao
International Conference on Computer Science and…
2008
Corpus ID: 896496
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption, which combines traditional pubic key encryption…
Expand
2006
2006
Use of a Validation Authority to Provide Risk Management for the PKI Relying Party
Jon Ølnes
,
L. Buene
European Public Key Infrastructure Workshop
2006
Corpus ID: 40282317
Interoperability between PKIs (Public Key Infrastructure) is a major issue in several electronic commerce scenarios. A Relying…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE