-
1
-
-
0345490607
-
Certificateless public key cryptography
-
LNCS 2894, Springer-Verlag
-
S.S. Al-Riyami and K.G. Paterson. Certificateless Public Key Cryptography. In Proceedings of ASIACRYPT 2003, LNCS 2894, pp. 452-473, Springer-Verlag, 2003.
-
(2003)
Proceedings of ASIACRYPT 2003
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
2
-
-
24144438230
-
CBE from CL-PKE: A generic construction and efficient schemes
-
LNCS 3386, Springer-Verlag
-
S.S. Al-Riyami and K.G. Paterson. CBE from CL-PKE: A Generic Construction and Efficient Schemes. In Proceedings of PKC 2005, LNCS 3386, pp. 398-415, Springer-Verlag, 2005.
-
(2005)
Proceedings of PKC 2005
, pp. 398-415
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
3
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM press
-
M. Bellare and P. Rogaway. Random Oracles are Practical: a Paradigm for Designing Efficient Protocols. In Proceedings of CCCS 1993, pp. 62-73, ACM press, 1993.
-
(1993)
Proceedings of CCCS 1993
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
33645958856
-
Certificateless public key encryption without pairing
-
LNCS 3650. Springer-Verlag
-
J. Baek, R. Safavi-Naini and W. Susilo. Certificateless Public Key Encryption Without Pairing. In Proceedings of ISC 2005, LNCS 3650, pp. 134-148. Springer-Verlag, 2005.
-
(2005)
Proceedings of ISC 2005
, pp. 134-148
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
5
-
-
35248844436
-
An idendity-based signature from gap diffie-hellman groups
-
LNCS 2567, Springer-Verlag
-
J. Cha and J. Cheon. An Idendity-Based Signature from Gap Diffie-Hellman Groups. In Proceedings of PKC 2003, LNCS 2567, pp. 18-30, Springer-Verlag, 2003.
-
(2003)
Proceedings of PKC 2003
, pp. 18-30
-
-
Cha, J.1
Cheon, J.2
-
6
-
-
33744808601
-
Efficient certificateless public key encryption
-
Report 2005/012
-
Z.H. Cheng and R. Comley. Efficient Certificateless Public Key Encryption. Cryptology ePrint Archive, Report 2005/012, 2005. http://eprint.iacr.org/2005/012.
-
(2005)
Cryptology ePrint Archive
-
-
Cheng, Z.H.1
Comley, R.2
-
7
-
-
24944525692
-
Idendity based threshold ring signature
-
LNCS 3506, Springer-Verlag
-
S.S.M. Chow, L.C.K. Hui and S.M. Yiu. Idendity Based Threshold Ring Signature. In Proceedings of ICISC 2004, LNCS 3506, pp. 218-232, Springer-Verlag, 2005.
-
(2005)
Proceedings of ICISC 2004
, pp. 218-232
-
-
Chow, S.S.M.1
Hui, L.C.K.2
Yiu, S.M.3
-
8
-
-
35048878391
-
Concurrent signatures
-
LNCS 3027, Springer-Verlag
-
L. Chen, C. Kudla and K.G. Paterson. Concurrent Signatures. In Proceedings of EUROCRYPT 2004, LNCS 3027, pp. 287-305, Springer-Verlag, 2004.
-
(2004)
Proceedings of EUROCRYPT 2004
, pp. 287-305
-
-
Chen, L.1
Kudla, C.2
Paterson, K.G.3
-
9
-
-
84937570422
-
Self-certified public keys
-
LNCS 547, Springer-Verlag
-
M. Girault. Self-Certified Public Keys. In Proceedings of EUROCRYPT 1991, LNCS 547, pp. 490-497, Springer-Verlag, 1991.
-
(1991)
Proceedings of EUROCRYPT 1991
, pp. 490-497
-
-
Girault, M.1
-
10
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali and R. Rivest. A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks. SIAM Journal of Computing, vol. 17, no. 2, pp. 281-308, 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
11
-
-
33744786523
-
On the security of certificateless signature schemes from asiacrypt 2003
-
LNCS 3810, Springer-Verlag
-
X. Huang, W. Susilo, Y. Mu and F. Zhang. On the Security of Certificateless Signature Schemes from Asiacrypt 2003. In Proceedings of CANS 2005, LNCS 3810, pp. 13-25, Springer-Verlag, 2005.
-
(2005)
Proceedings of CANS 2005
, pp. 13-25
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
12
-
-
18244396341
-
Certificateless signature and proxy signature schemes from bilinear pairings
-
Springer-Verlag
-
X. Li, K. Chen and L. Sun. Certificateless Signature and Proxy Signature Schemes from Bilinear Pairings. Lithuanian Mathematical Journal, Vol 45, pp. 76-83, Springer-Verlag, 2005.
-
(2005)
Lithuanian Mathematical Journal
, vol.45
, pp. 76-83
-
-
Li, X.1
Chen, K.2
Sun, L.3
-
13
-
-
33749383760
-
An authenticated certificateless public key encryption scheme
-
Report 2004/150
-
Y.R. Lee and H.S. Lee. An Authenticated Certificateless Public Key Encryption Scheme. Cryptology ePrint Archive, Report 2004/150, 2004. http://eprint.iacr.org/2004/150.
-
(2004)
Cryptology ePrint Archive
-
-
Lee, Y.R.1
Lee, H.S.2
-
14
-
-
84927727752
-
Security proofs for signature schemes
-
LNCS 1070, Springer-Verlag
-
D. Pointcheval and J. Stern. Security Proofs for Signature Schemes. In Proceedings of EUROCRYPT 1996, LNCS 1070, pp. 387-398, Springer-Verlag, 1996.
-
(1996)
Proceedings of EUROCRYPT 1996
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
15
-
-
85020598353
-
Identity based cryptosystems and signature scheme
-
LNCS 196, Springer-Verlag
-
A. Shamir. Identity Based Cryptosystems and Signature Scheme. In Proceedings of CRYPTO 1984, LNCS 196, pp. 47-53, Springer-Verlag, 1984.
-
(1984)
Proceedings of CRYPTO 1984
, pp. 47-53
-
-
Shamir, A.1
-
16
-
-
38049036156
-
Provable efficient certificateless public key encrytion
-
Report 2005/287
-
Y. Shi and J. Li. Provable Efficient Certificateless Public Key Encrytion. Cryptology ePrint Archive, Report 2005/287. http://eprint.iacr.org/ 2005/287.
-
Cryptology ePrint Archive
-
-
Shi, Y.1
Li, J.2
-
17
-
-
35048832495
-
Generic construction of certificateless signature
-
LNCS 3108, Springer-Verlag
-
D.H. Yum and P.J. Lee. Generic Construction of Certificateless Signature. In Proceedings of ACISP 2004, LNCS 3108, pp. 200-211, Springer-Verlag, 2004.
-
(2004)
Proceedings of ACISP 2004
, pp. 200-211
-
-
Yum, D.H.1
Lee, P.J.2
|