A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures
Identifieur interne : 000F08 ( Main/Exploration ); précédent : 000F07; suivant : 000F09A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures
Auteurs : Alexander W. Dent [Royaume-Uni]Source :
- Lecture Notes in Computer Science [ 0302-9743 ] ; 2010.
Abstract
Abstract: Certificateless encryption is a form of public-key encryption that is designed to eliminate the disadvantages of both traditional PKI-based public-key encryption scheme and identity-based encryption. Unlike public-key encryption, there is no requirement for digital certificates or a public-key infrastructure. Unlike identity-based encryption, the trusted third party need not be given the ability to decrypt ciphertexts intended for users. In this invited paper we will review the concept of certificateless encryption from an infrastructure point of view and show that many of the different formulations for “certificateless” encryption can be instantiated using public-key infrastructures after all.
Url:
DOI: 10.1007/978-3-642-16441-5_1
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: 003032
- to stream Istex, to step Curation: 003032
- to stream Istex, to step Checkpoint: 000729
- to stream Main, to step Merge: 000F11
- to stream Main, to step Curation: 000F08
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures</title>
<author><name sortKey="Dent, Alexander W" sort="Dent, Alexander W" uniqKey="Dent A" first="Alexander W." last="Dent">Alexander W. Dent</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:38EE0C66711C9B66DE2EE5E4545DBA5CDD36F733</idno>
<date when="2010" year="2010">2010</date>
<idno type="doi">10.1007/978-3-642-16441-5_1</idno>
<idno type="url">https://api.istex.fr/document/38EE0C66711C9B66DE2EE5E4545DBA5CDD36F733/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">003032</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">003032</idno>
<idno type="wicri:Area/Istex/Curation">003032</idno>
<idno type="wicri:Area/Istex/Checkpoint">000729</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000729</idno>
<idno type="wicri:doubleKey">0302-9743:2010:Dent A:a:brief:introduction</idno>
<idno type="wicri:Area/Main/Merge">000F11</idno>
<idno type="wicri:Area/Main/Curation">000F08</idno>
<idno type="wicri:Area/Main/Exploration">000F08</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures</title>
<author><name sortKey="Dent, Alexander W" sort="Dent, Alexander W" uniqKey="Dent A" first="Alexander W." last="Dent">Alexander W. Dent</name>
<affiliation wicri:level="4"><country xml:lang="fr">Royaume-Uni</country>
<wicri:regionArea>Information Security Group, Royal Holloway, University of London</wicri:regionArea>
<placeName><settlement type="city">Londres</settlement>
<region type="country">Angleterre</region>
<region type="région" nuts="1">Grand Londres</region>
</placeName>
<orgName type="university">Université de Londres</orgName>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">Royaume-Uni</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s">Lecture Notes in Computer Science</title>
<imprint><date>2010</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">38EE0C66711C9B66DE2EE5E4545DBA5CDD36F733</idno>
<idno type="DOI">10.1007/978-3-642-16441-5_1</idno>
<idno type="ChapterID">1</idno>
<idno type="ChapterID">Chap1</idno>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: Certificateless encryption is a form of public-key encryption that is designed to eliminate the disadvantages of both traditional PKI-based public-key encryption scheme and identity-based encryption. Unlike public-key encryption, there is no requirement for digital certificates or a public-key infrastructure. Unlike identity-based encryption, the trusted third party need not be given the ability to decrypt ciphertexts intended for users. In this invited paper we will review the concept of certificateless encryption from an infrastructure point of view and show that many of the different formulations for “certificateless” encryption can be instantiated using public-key infrastructures after all.</div>
</front>
</TEI>
<affiliations><list><country><li>Royaume-Uni</li>
</country>
<region><li>Angleterre</li>
<li>Grand Londres</li>
</region>
<settlement><li>Londres</li>
</settlement>
<orgName><li>Université de Londres</li>
</orgName>
</list>
<tree><country name="Royaume-Uni"><region name="Angleterre"><name sortKey="Dent, Alexander W" sort="Dent, Alexander W" uniqKey="Dent A" first="Alexander W." last="Dent">Alexander W. Dent</name>
</region>
<name sortKey="Dent, Alexander W" sort="Dent, Alexander W" uniqKey="Dent A" first="Alexander W." last="Dent">Alexander W. Dent</name>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000F08 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000F08 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Ticri/CIDE |area= TelematiV1 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:38EE0C66711C9B66DE2EE5E4545DBA5CDD36F733 |texte= A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures }}
This area was generated with Dilib version V0.6.31. |