Aggregate and verifiably encrypted signatures from bilinear maps

D Boneh, C Gentry, B Lynn, H Shacham - … Warsaw, Poland, May 4–8, 2003 …, 2003‏ - Springer
An aggregate signature scheme is a digital signature that supports aggregation: Given n
signatures on n distinct messages from n distinct users, it is possible to aggregate all these …

Identity-based encryption from the Weil pairing

D Boneh, M Franklin - SIAM journal on computing, 2003‏ - SIAM
We propose a fully functional identity-based encryption (IBE) scheme. The scheme has
chosen ciphertext security in the random oracle model assuming a variant of the …

Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack

R Cramer, V Shoup - SIAM Journal on Computing, 2003‏ - SIAM
A new public-key encryption scheme, along with several variants, is proposed and analyzed.
The scheme and its variants are quite practical and are proved secure against adaptive …

Selecting cryptographic key sizes

AK Lenstra, ER Verheul - International Workshop on Public Key …, 2000‏ - Springer
LNCS 1751 - Selecting Cryptographic Key Sizes Page 1 H. Imai, Y. Zheng (Eds.): PKC 2000,
LNCS 1751, pp. 446-465, 2000. © Springer-Verlag Berlin Heidelberg 2000 Selecting …

Intrusion-resilient public-key encryption

Y Dodis, M Franklin, J Katz, A Miyaji, M Yung - Topics in Cryptology—CT …, 2003‏ - Springer
Exposure of secret keys seems to be inevitable, and may in practice represent the most
likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilience …

Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model

O Wakaha - Cryptology ePrint Archive, 2006‏ - eprint.iacr.org
In this paper, we present some more results about the security of the Kurosawa-Desmedt
encryption scheme and a variant of it. We prove that after a modification, those schemes are …