ID-based cryptography

Known as: Identity Based Public Key Cryptography, IDPKC, Cocks Identity Based Encryption 
Identity-based cryptography is a type of public-key cryptography in which a publicly known string representing an individual or organization is used… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
1Department of Computer Science, Guelma University, BP 401, 24000 Guelma, Algeria 2Networks and Systems Laboratory, Badji Mokhtar… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
2013
2013
This paper addresses the security issues of storing sensitive data in a cloud storage service and the need for users to trust the… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
2013
2013
This paper addresses the security issues of storing sensitive data in a cloud storage service and the need for users to trust the… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
A body sensor network (BSN), is a network of sensors deployed on a person's body, usually for health care monitoring. Since the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
  • Henri Cohen, Gerhard Frey, +4 authors Frederik Vercauteren
  • 2005
MR2162716 (2007f:14020) 14G50 (11G05 11G07 11T71 94-00 94A60) FHandbook of elliptic and hyperelliptic curve cryptography. Edited… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
ID-based cryptosystems have many advantages over PKI based cryptosystems in key distribution, but they also have an inherent… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to… (More)
  • table 1
  • table 2
Is this relevant?
2002
2002
We present hierarchical identity-based encryption schemes and signature schemes that have total collusion resistance on an… (More)
Is this relevant?
Highly Cited
2002