Identity-Based Traitor Tracing, PKC'07, vol.4450, pp.361-376, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00918560
Generalized Key Delegation for Hierarchical Identity-Based Encryption, ESORICS'07, vol.4734, pp.139-154, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00918551
Certificateless Public Key Cryptography, Asiacrypt'03, vol.2894, pp.452-473, 2003. ,
Traceable and Retrievable Identity-Based Encryption, ACNS'08, vol.5037, pp.94-110, 2008. ,
Extended Notions of Security for Multicast Public Key Cryptosystems, ICALP'00, vol.1853, pp.499-511, 2000. ,
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme, Eurocrypt'09, vol.5479, pp.407-424, 2009. ,
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Eurocrypt'04, vol.3027, pp.223-238, 2004. ,
Secure Identity-Based Encryption Without Random Oracles, Crypto'04, vol.3152, pp.443-459, 2004. ,
Hierarchical Identity-Based encryption with Constant Size Ciphertext, Eurocrypt'05, vol.3494, pp.440-456, 2005. ,
Identity-Based Encryption from the Weil Pairing, earlier version in Crypto'01, vol.32, pp.213-229, 2001. ,
Hamburg Space-Efficient Identity-Based Encryption Without Pairings, FOCS'07, pp.647-657, 2007. ,
Generalized Identity Based and Broadcast Encryption Schemes, Asiacrypt'08, vol.5350, pp.455-470, 2008. ,
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption, CT-RSA'05, vol.3376, pp.87-103, 2005. ,
Direct Chosen Ciphertext Security from Identity-Based Techniques, ACM CCS'05, pp.320-329, 2005. ,
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles), Crypto'06, vol.4117, pp.290-307, 2006. ,
A Forward-Secure Public-Key Encryption Scheme, Eurocrypt'03, vol.2656, pp.254-271, 2003. ,
Chosen-Ciphertext Security from Identity-Based Encryption, Eurocrypt'04, vol.3027, pp.207-222, 2004. ,
Security Analysis of the Strong Diffie-Hellman Problem, Eurocrypt'06, vol.4004, pp.1-11, 2006. ,
An Identity-Based Encryption Scheme Based on Quadratic Residues, 8th IMA International Conference, vol.2260, pp.360-363, 2001. ,
A Practical Public-Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack, Crypto'98, vol.1462, pp.13-25, 1998. ,
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption, Eurocrypt'02, vol.2332, pp.45-64, 2002. ,
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, Asiacrypt'07, vol.4833, pp.200-215, 2007. ,
, Pairings for cryptographers, vol.156, pp.3113-3121, 2008.
Certificate-Based Encryption and the Certificate Revocation Problem, Eurocrypt'03, vol.2656, pp.272-293, 2003. ,
Practical Identity-Based Encryption Without Random Oracles, Eurocrypt'06, vol.4004, pp.445-464, 2006. ,
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts), Eurocrypt'09, vol.5479, pp.171-188, 2009. ,
On Computing Products of Pairings, 2006. ,
Hierarchical ID-Based Cryptography, Asiacrypt'02, vol.2501, pp.548-566, 2002. ,
Reducing Trust in the PKG in Identity-Based Cryptosystems, Crypto'07, vol.4622, pp.430-447, 2007. ,
Black-Box Accountable Authority Identity Based Encryption, ACM-CCS'08, 2008. ,
Attribute-based encryption for fine-grained access control of encrypted data, ACM CCS'06, pp.89-98, 2006. ,
Secure Hybrid Encryption from Weakened Key Encapsulation, Crypto'07, vol.4622, pp.553-571, 2007. ,
Updated version available as Cryptology ePrint Archive, Eurocrypt'02, vol.2332, pp.450-465, 2002. ,
, CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption In CT-RSA'08, vol.4964, pp.221-238, 2008.
A New Paradigm of Hybrid Encryption Scheme, Crypto'04, vol.3152, pp.445-456, 2004. ,
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys, PKC'09, vol.5443, pp.235-255, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00356999
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes, Crypto'92, vol.740, pp.31-53, 2002. ,
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Crypto'91, vol.576, pp.129-140, 1991. ,
, Fuzzy Identity-Based Encryption In Eurocrypt'05, vol.3494, pp.457-473, 2005.
ID-based Cryptosystems with Pairing on Elliptic Curve, SCIS'03, 2003. ,
Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks, ProvSec'07, vol.4784, pp.51-67, 2007. ,
Efficient Identification and Signatures for Smart Cards, Crypto'89, vol.435, pp.239-252, 1989. ,
Identity-Based Cryptosystems and Signature Schemes, Crypto'84, vol.196, pp.47-53, 1984. ,
A Note on An Encryption Scheme of Kurosawa and Desmedt, Cryptology ePrint Archive, 2004. ,
Efficient Identity-Based Encryption Without Random Oracles, Eurocrypt'05, vol.3494, pp.114-127, 2005. ,