Public-Key Encryption in the Bounded-Retrieval Model, Advances in Cryptology -EURO- CRYPT 2010, pp.113-134, 2010. ,
DOI : 10.1007/978-3-642-13190-5_6
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Advances in Cryptology -EUROCRYPT 2004, pp.223-238, 2004. ,
DOI : 10.1007/978-3-540-24676-3_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5446
Identity-Based Encryption from the Weil Pairing, SIAM Journal on Computing, vol.32, issue.3, pp.586-615, 2003. ,
DOI : 10.1137/S0097539701398521
Space-efficient identity based encryption without pairings, 48th Annual IEEE Symposium on Foundations of Computer Science, pp.647-657, 2007. ,
DOI : 10.1109/focs.2007.50
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.1246
General Ad Hoc Encryption from Exponent Inversion IBE, Advances in Cryptology -EUROCRYPT 2007, pp.394-411, 2007. ,
DOI : 10.1007/978-3-540-72540-4_23
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.515.8779
Practical leakage-resilient identity-based encryption from simple assumptions, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.152-161, 2010. ,
DOI : 10.1145/1866307.1866325
A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model, Designs, Codes and Cryptography, vol.50, issue.1, pp.115-133, 2009. ,
DOI : 10.1007/s10623-008-9218-2
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, SIAM Journal on Computing, vol.38, issue.1, pp.97-139, 2008. ,
DOI : 10.1137/060651380
URL : http://arxiv.org/abs/cs/0602007
Intrusion-Resilience Via the Bounded-Storage Model, Third Theory of Cryptography Conference TCC 2006, pp.207-224, 2006. ,
DOI : 10.1007/11681878_11
Practical Identity-Based Encryption Without Random Oracles, Advances in Cryptology -EUROCRYPT 2006, pp.445-464, 2006. ,
DOI : 10.1007/11426639_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.414.6168
Trapdoors for hard lattices and new cryptographic constructions, Proceedings of the fourtieth annual ACM symposium on Theory of computing, STOC 08, pp.197-206, 2008. ,
DOI : 10.1145/1374376.1374407
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.63.7052
Lest we remember, Proceedings of the 17th USENIX Security Symposium, pp.45-60, 2008. ,
DOI : 10.1145/1506409.1506429
Differential Power Analysis, Advances in Cryptology -CRYPTO 1999, pp.388-397, 1999. ,
DOI : 10.1007/3-540-48405-1_25
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, pp.455-479, 2010. ,
DOI : 10.1007/978-3-540-78967-3_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.604
Public-key cryptosystems resilient to key leakage, Advances in Cryptology -CRYPTO 2009, pp.18-35, 2009. ,
DOI : 10.1137/100813464
Efficient Identity-Based Encryption Without Random Oracles, Advances in Cryptology -EUROCRYPT 2005, pp.114-127, 2005. ,
DOI : 10.1007/11426639_7