Cryptology ePrint Archive: Report 2005/320
Available versions in chronological order
20050912:121854 (posted 12-Sep-2005 12:18:54 UTC)
Identity-Based Encryption Schemes with Tight Security Reductions
Nuttapong Attrapadung and Jun Furukawa and Takeshi Gomi and Goichiro Hanaoka and Hideki Imai and Rui Zhang
20050913:051208 (posted 13-Sep-2005 05:12:08 UTC)
Identity-Based Encryption Schemes with Tight Security Reductions
Nuttapong Attrapadung and Jun Furukawa and Takeshi Gomi and Goichiro Hanaoka and Hideki Imai and Rui Zhang
20051107:083219 (posted 07-Nov-2005 08:32:19 UTC)
Identity-Based Encryption Schemes with Tight Security Reductions
Nuttapong Attrapadung and Jun Furukawa and Takeshi Gomi and Goichiro Hanaoka and Hideki Imai and Rui Zhang
20051124:072627 (posted 24-Nov-2005 07:26:27 UTC)
Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong Attrapadung and Benoit Chevallier-Mames and Jun Furukawa and Takeshi Gomi and Goichiro Hanaoka and Hideki Imai and Rui Zhang
[
Cryptology ePrint archive
]