-
1
-
-
0345490607
-
Certificateless public key cryptography
-
Proceedings of the ASIACRYPT, Springer-Verlag
-
Al-Riyami S.S., Paterson K.G. (2003) Certificateless public key cryptography. In Proceedings of the ASIACRYPT 2003, pages 452-473. Springer-Verlag, LNCS 2894.
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
2
-
-
35048876343
-
-
Bellare M., Namprempre C., Neven G. (2004) Security proofs for identity-based identification and signature schemes. In: Proceedings of the EUROCRYPT 2004, p268-286. LNCS 3027. Springer-Verlag, Berlin (Full paper is available at Bellare's homepage URL: http://www-cse.ucsd.edu/users/mihir).
-
Bellare M., Namprempre C., Neven G. (2004) Security proofs for identity-based identification and signature schemes. In: Proceedings of the EUROCRYPT 2004, p268-286. LNCS 3027. Springer-Verlag, Berlin (Full paper is available at Bellare's homepage URL: http://www-cse.ucsd.edu/users/mihir).
-
-
-
-
4
-
-
84956866842
-
Unknown key-share attacks on the station-to-station (STS) protocol
-
Public key cryptography, second international workshop on practice and theory in public key cryptography, PKC '99, 1560. Springer-Verlag, Berlin, pp
-
Blake-Wilson S., Menezes A. (1999) Unknown key-share attacks on the station-to-station (STS) protocol. In: Public key cryptography, second international workshop on practice and theory in public key cryptography, PKC '99. LNCS 1560. Springer-Verlag, Berlin, pp154-170
-
(1999)
LNCS
, pp. 154-170
-
-
Blake-Wilson, S.1
Menezes, A.2
-
5
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Proceedings of the CRYPTO, Springer-Verlag, Berlin, p
-
Boneh D., Franklin M. (2001) Identity-based encryption from the Weil pairing. In: Proceedings of the CRYPTO 2001, LNCS 2139. Springer-Verlag, Berlin, p213-229
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal T. (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inform Theory, 31(4):469-472
-
(1985)
IEEE Trans Inform Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
7
-
-
84937570422
-
Self-certified public keys
-
Proceedings of the EUROCRYPT, 547. Springer-Verlag, Berlin, p
-
Girault M. (1991) Self-certified public keys. In: Proceedings of the EUROCRYPT 91, LNCS 547. Springer-Verlag, Berlin, p490-497
-
(1991)
LNCS
, vol.91
, pp. 490-497
-
-
Girault, M.1
-
8
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attack
-
Goldwasser S., Micali S., Rivest R. (1998) A digital signature scheme secure against adaptive chosen-message attack. SIAM J Comput 17(2):281-308
-
(1998)
SIAM J Comput
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
9
-
-
33746370456
-
Key replacement attack against a generic construction of certificateless signature
-
Springer-Verlag, Berlin, pp
-
Hu B.C., Wong D.S., Zhang Z., Deng X. (2006) Key replacement attack against a generic construction of certificateless signature. In: Information security and privacy: 11th Australasian conference, ACISP 2006, LNCS 4058. Springer-Verlag, Berlin, pp235-246
-
(2006)
Information security and privacy: 11th Australasian conference, ACISP 2006, LNCS
, vol.4058
, pp. 235-246
-
-
Hu, B.C.1
Wong, D.S.2
Zhang, Z.3
Deng, X.4
-
10
-
-
33744786523
-
On the security of certificateless signature schemes from Asiacrypt 2003
-
Cryptology and network security, 4th international conference, CANS, Springer-Verlag, Berlin, pp
-
Huang X., Susilo W., Mu Y., Zhang F. (2005) On the security of certificateless signature schemes from Asiacrypt 2003. In: Cryptology and network security, 4th international conference, CANS 2005, LNCS 3810. Springer-Verlag, Berlin, pp13-25
-
(2005)
LNCS
, vol.3810
, pp. 13-25
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
11
-
-
84927727752
-
Security proofs for signature schemes
-
Proceedings of the EUROCRYPT, 1070. pp
-
Pointcheval D., Stern J. (1996) Security proofs for signature schemes. In: Proceedings of the EUROCRYPT 96, LNCS 1070. pp387-398
-
(1996)
LNCS
, vol.96
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
12
-
-
33846242607
-
-
Shamir A. (1984) Identity-based cryptosystems and signature schemes. In: Procedings of the CRYPTO 84, LNCS 196. Springer, Berlin, pp47-53
-
Shamir A. (1984) Identity-based cryptosystems and signature schemes. In: Procedings of the CRYPTO 84, LNCS 196. Springer, Berlin, pp47-53
-
-
-
-
13
-
-
35048832495
-
Generic construction of certificateless signature
-
Springer-Verlag, Berlin, pp
-
Yum D.H., Lee P.J. (2004) Generic construction of certificateless signature. In: Information security and privacy: 9th Australasian Conference, ACISP 2004, LNCS 3108. Springer-Verlag, Berlin, pp200-211
-
(2004)
Information security and privacy: 9th Australasian Conference, ACISP 2004, LNCS
, vol.3108
, pp. 200-211
-
-
Yum, D.H.1
Lee, P.J.2
-
14
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its applications
-
Seventh international workshop on theory and practice in public key cryptography PKC, Springer, Berlin, pp
-
Zhang F., Safavi-Naini R., Susilo W. (2004) An efficient signature scheme from bilinear pairings and its applications. In: Seventh international workshop on theory and practice in public key cryptography (PKC 2004), LNCS 2947. Springer, Berlin, pp277-290
-
(2004)
LNCS
, vol.2947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
-
15
-
-
33746591632
-
Certificateless public-key signature: Security model and efficient construction
-
Fourth international conference on applied cryptography and network security ACNS, Springer, Berlin, pp
-
Zhang Z., Wong D., Xu J., Feng D. (2006) Certificateless public-key signature: Security model and efficient construction. In: Fourth international conference on applied cryptography and network security (ACNS 2006), LNCS 3989. Springer, Berlin, pp293-308
-
(2006)
LNCS
, vol.3989
, pp. 293-308
-
-
Zhang, Z.1
Wong, D.2
Xu, J.3
Feng, D.4
|