Security proof of Sakai-Kasahara's identity-based encryption scheme
Saved in:
| Published in | Lecture notes in computer science pp. 442 - 459 |
|---|---|
| Main Authors | , |
| Format | Conference Proceeding |
| Language | English |
| Published |
Berlin
Springer
2005
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 354030276X 9783540302766 |
| ISSN | 0302-9743 |
Cover
| Author | ZHAOHUI CHENG LIQUN CHEN |
|---|---|
| Author_xml | – sequence: 1 surname: LIQUN CHEN fullname: LIQUN CHEN organization: Hewlett-Packard Laboratories, Bristol, United Kingdom – sequence: 2 surname: ZHAOHUI CHENG fullname: ZHAOHUI CHENG organization: School of Computing Science, Middlesex University, The Burroughs Hendon, London NW4 4BT, United Kingdom |
| BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17414749$$DView record in Pascal Francis |
| BookMark | eNotjEtrwzAQhAVNoXn9B19KTwKt19LGx2L6ooEe0kJuYW3JRG0iG8k9-N_XoRkG5hsYZiFmoQvuRixQFwpVTmY_E_MLyZIKvBPrlL7VJARShHNR7VzzG_0wZn3sujabvOMf9vKdEx858kPKvHVhmCay5uRs5kITx37wXchSc3RntxK3LZ-SW19zKb6enz6rV7n9eHmrHreyB9CD3LA1LaLatAylzktjEUErqpksabA1W9bGAWouyQCDu9TamtzmuSWDS3H__9tzavjURg6NT4c--jPH8QBUQEFFiX8ceEsN |
| ContentType | Conference Proceeding |
| Copyright | 2006 INIST-CNRS |
| Copyright_xml | – notice: 2006 INIST-CNRS |
| DBID | IQODW |
| DatabaseName | Pascal-Francis |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Applied Sciences Mathematics Computer Science |
| EndPage | 459 |
| ExternalDocumentID | 17414749 |
| GroupedDBID | -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE ALMA_UNASSIGNED_HOLDINGS EJD F5P FEDTE HVGLF IQODW LAS LDH P2P RIG RNI RSU SVGTG VI1 ~02 |
| ID | FETCH-LOGICAL-p115t-8ad6f3308fa195296d331507ba7d751dbada56e135a9761a1ea56ebd62d22d763 |
| ISBN | 354030276X 9783540302766 |
| ISSN | 0302-9743 |
| IngestDate | Wed Apr 02 07:19:05 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Identifier Probabilistic approach Asymmetry Private key Coding Confidence Public key Encryption Cryptography Decryption Oracle Modeling |
| Language | English |
| License | CC BY 4.0 |
| LinkModel | OpenURL |
| MeetingName | Cryptography and coding (10th IMA International Conference, Cirencester, UK, December 19-21, 2005) |
| MergedId | FETCHMERGED-LOGICAL-p115t-8ad6f3308fa195296d331507ba7d751dbada56e135a9761a1ea56ebd62d22d763 |
| PageCount | 18 |
| ParticipantIDs | pascalfrancis_primary_17414749 |
| PublicationCentury | 2000 |
| PublicationDate | 2005 |
| PublicationDateYYYYMMDD | 2005-01-01 |
| PublicationDate_xml | – year: 2005 text: 2005 |
| PublicationDecade | 2000 |
| PublicationPlace | Berlin |
| PublicationPlace_xml | – name: Berlin |
| PublicationTitle | Lecture notes in computer science |
| PublicationYear | 2005 |
| Publisher | Springer |
| Publisher_xml | – name: Springer |
| SSID | ssj0000317073 ssj0002792 |
| Score | 2.0672812 |
| SourceID | pascalfrancis |
| SourceType | Index Database |
| StartPage | 442 |
| SubjectTerms | Applied sciences Computer science; control theory; systems Cryptography Exact sciences and technology Information, signal and communications theory Memory and file management (including protection and security) Memory organisation. Data processing Signal and communications theory Software Telecommunications and information theory |
| Title | Security proof of Sakai-Kasahara's identity-based encryption scheme |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF60XvSiVsVnyUHwUFaS7CZpj1KqrdaqaEW8lH0kUMS0NPGgv97Z7CZpiiAKJbRDCEu_yc5jZ75B6NSNfPC6Q4Z9UBdMIxFixqXARAjCfcp4W6gG59uh3xvR6xfvpRzBmXWXpPxcfP3YV_IfVEEGuKou2T8gWzwUBPAd8IUrIAzXJef3RzszMPn_eJpmZVVZfbga0dA0dm1RHx7NoDpVkQUOoupVYW9sgm9YwhRpc5a4n-i23U-sjJtswjPmn3pPgSA4fC-UYNB_GA0VnUJxkPPau7jrjfqZ7KqSSvCWUgl5KrESYqq8kDrb1LNR8lYr2EYhECELOx_VJFnGiFJD813ht16yO0U1IARFDg1oexWtBi27htYuuteD5yJTBttOkHHoG_uqKA_12ZBehOnYyRZpOJXKRataV5aAukd6TsmC8_C0hXbLtkrrvgByG62EcR1tmjjAMrtsAqJ81EYuq6ON24JeN9lBnRxMKwPTgk8VzLPEqkJplVBaGspdNLrsPnV62EzDwDPw2lPcYtKPCLFbEXPa6rRcEqK8ec4CGXiO5EwyeOsc4jFwMR3mhOonl74rXVeCGdlDtXgah_vI4m5IWzanPheCSoh5OXG5Z4uA2pSJwDtAjcqfNp5p5pNxjtThbzccofVSwY5RLZ1_hCfgvaW8YeD9Bjm9RU0 |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Lecture+notes+in+computer+science&rft.atitle=Security+proof+of+Sakai-Kasahara%27s+identity-based+encryption+scheme&rft.au=LIQUN+CHEN&rft.au=ZHAOHUI+CHENG&rft.date=2005-01-01&rft.pub=Springer&rft.isbn=9783540302766&rft.issn=0302-9743&rft.spage=442&rft.epage=459&rft.externalDBID=n%2Fa&rft.externalDocID=17414749 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon |