Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
9
views
32
references
Top references
cited by
5
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,610
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Public Key Cryptography – PKC 2012
Circular and KDM Security for Identity-Based Encryption
other
Author(s):
Jacob Alperin-Sheriff
,
Chris Peikert
Publication date
(Print):
2012
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Transnational Chinese identity
Most cited references
32
Record
: found
Abstract
: not found
Book Chapter
: not found
Identity-Based Cryptosystems and Signature Schemes
Adi Shamir
(1985)
0
comments
Cited
330
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Fully homomorphic encryption using ideal lattices
Craig Gentry
(2009)
0
comments
Cited
162
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Probabilistic encryption
Shafi Goldwasser
,
Silvio Micali
(1984)
0
comments
Cited
124
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2012
Pages
: 334-352
DOI:
10.1007/978-3-642-30057-8_20
SO-VID:
981bdad6-5513-42f6-a14b-1ebef39d5dd1
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Better Bootstrapping in Fully Homomorphic Encryption
pp. 52
On Homomorphic Encryption and Chosen-Ciphertext Security
pp. 262
Public Key Encryption against Related Key Attacks
pp. 390
Password-Based Authenticated Key Exchange
pp. 34
Ring-LWE in Polynomial Rings
pp. 206
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
pp. 280
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
pp. 334
Circular and KDM Security for Identity-Based Encryption
pp. 680
Efficient Network Coding Signatures in the Standard Model
pp. 697
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
Similar content
3,610
MVC frameworks modernization approach: adding MVC concepts to KDM metamodel
Authors:
A Moutaouakkil
,
S Mbarki
Modular arrangements of sequence motifs determine the functional diversity of KDM proteins
Authors:
Zerong Wang
,
Dongyang Liu
,
Baofang Xu
…
KDM-CCA Security from RKA Secure Authenticated Encryption
Authors:
Xianhui Lu
,
Bao Li
,
Dingding Jia
See all similar
Cited by
5
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
Authors:
Shweta Agrawal
,
Benoit Libert
,
Damien Stehle
GGHLite: More Efficient Multilinear Maps from Ideal Lattices
Authors:
Adeline Langlois
,
Damien Stehle
,
Ron Steinfeld
KDM-CCA Security from RKA Secure Authenticated Encryption
Authors:
Xianhui Lu
,
Bao Li
,
Dingding Jia
See all cited by