-
1
-
-
21144454271
-
Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups
-
Joux, A., Nguyen, K.: Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups. Journal of Cryptology 16, 239-247 (2003)
-
(2003)
Journal of Cryptology
, vol.16
, pp. 239-247
-
-
Joux, A.1
Nguyen, K.2
-
2
-
-
84949961454
-
-
Yum, B.H., Lee, P.J.: New Signcryption Schemes Based on KCDSA. In: Kim, K.-c. (ed.) IClSC 2001. LNCS, 2288, pp. 305-317. Springer, Heidelberg (2002)
-
Yum, B.H., Lee, P.J.: New Signcryption Schemes Based on KCDSA. In: Kim, K.-c. (ed.) IClSC 2001. LNCS, vol. 2288, pp. 305-317. Springer, Heidelberg (2002)
-
-
-
-
3
-
-
84939205648
-
New identity based signcryption schemes based on pairings
-
Quisquater ed, France
-
Libert, B., Quisquater, J.-J.: New identity based signcryption schemes based on pairings. In: Quisquater (ed.) ITW 2003. Proc. of the IEEE Information Theory Workshop, Paris, Freeh, pp. 234-238. France (2003)
-
(2003)
ITW 2003. Proc. of the IEEE Information Theory Workshop, Paris, Freeh
, pp. 234-238
-
-
Libert, B.1
Quisquater, J.-J.2
-
4
-
-
84939205648
-
New identity based signcryption schemes from pairings. In: Waters, B
-
Libert, B., Quisquater, J.-J.: New identity based signcryption schemes from pairings. In: Waters, B. (ed.) In IEEE Information Theory Workshop, Paris, Freeh, pp. 155-158 (2003)
-
(2003)
(ed.) In IEEE Information Theory Workshop, Paris, Freeh
, pp. 155-158
-
-
Libert, B.1
Quisquater, J.-J.2
-
5
-
-
35048859269
-
-
Libert, B., Quisquater, J.-J.: Efficient signcryption with key privacy from GapDiffie- Hellman groups. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, 2947, pp. 187-200. Springer, Heidelberg (2004)
-
Libert, B., Quisquater, J.-J.: Efficient signcryption with key privacy from GapDiffie- Hellman groups. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 187-200. Springer, Heidelberg (2004)
-
-
-
-
6
-
-
23944487277
-
-
Libert, B., Quisquater, J.J.: Improved signcryption from q-Diffie-Hellman problems. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, 3352, pp. 220-234. Springer, Heidelberg (2005)
-
Libert, B., Quisquater, J.J.: Improved signcryption from q-Diffie-Hellman problems. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 220-234. Springer, Heidelberg (2005)
-
-
-
-
7
-
-
32244446609
-
-
Tan, C.-H.: Security analysis of signcryption scheme from q- Diffie-Hellman problem. IEICE TRANS. FUNDAMENTALS E89CA(1), 1234-1236 (2006)
-
Tan, C.-H.: Security analysis of signcryption scheme from q- Diffie-Hellman problem. IEICE TRANS. FUNDAMENTALS E89CA(1), 1234-1236 (2006)
-
-
-
-
8
-
-
33845933978
-
Efficient Short Signcryption Scheme with Public Verifiability
-
Lipmaa, H, Yung, M, Lin, D, eds, Inscrypt 2006, Springer, Heidelberg
-
Ma, C.: Efficient Short Signcryption Scheme with Public Verifiability. In: Lipmaa, H., Yung, M., Lin, D. (eds.) Inscrypt 2006. LNCS, vol. 4318, pp. 118-129. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4318
, pp. 118-129
-
-
Ma, C.1
-
9
-
-
84870707379
-
A Practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Cramer, R., Shoup, V.: A Practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
10
-
-
84944242785
-
-
Steinfeld, R., Zheng, Y.: A Signcryption Scheme Based on Integer Factorization. In: Okamoto, E., Pieprzyk, J.P., Seberry, J. (eds.) ISW 2000. LNCS, 1975, pp. 308-322. Springer, Heidelberg (2000)
-
Steinfeld, R., Zheng, Y.: A Signcryption Scheme Based on Integer Factorization. In: Okamoto, E., Pieprzyk, J.P., Seberry, J. (eds.) ISW 2000. LNCS, vol. 1975, pp. 308-322. Springer, Heidelberg (2000)
-
-
-
-
11
-
-
35048854673
-
Efficient forward and provably secure ID-Based signcryption scheme with public verifiability and public ciphertext authenticity
-
Lim, J.-I, Lee, D.-H, eds, ICISC 2003, Springer, Heidelberg
-
Chow, S., et al.: Efficient forward and provably secure ID-Based signcryption scheme with public verifiability and public ciphertext authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352-369. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2971
, pp. 352-369
-
-
Chow, S.1
-
12
-
-
35248874429
-
Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Boyen, X.: Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 382-398. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 382-398
-
-
Boyen, X.1
-
13
-
-
63449122349
-
ii- Cost(Signature)+Cost(Encryption)
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
ii- Cost(Signature)+Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165-179. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
14
-
-
84937414347
-
-
Zheng, Y.: Identification, Signature and Signcryption using High Order Residues Modulo an RSA Composite. In: Kim, K.-c. (ed.) PKC 2001. LNCS, 1992, pp. 48-63. Springer, Heidelberg (2001)
-
Zheng, Y.: Identification, Signature and Signcryption using High Order Residues Modulo an RSA Composite. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 48-63. Springer, Heidelberg (2001)
-
-
-
-
15
-
-
84947929166
-
Signcryption and its applications in efficient public key solutions
-
Cluet, S, Hull, R, eds, Database Programming Languages, Springer, Heidelberg
-
Zheng, Y.: Signcryption and its applications in efficient public key solutions. In: Cluet, S., Hull, R. (eds.) Database Programming Languages. LNCS, vol. 1369, pp. 291-312. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1369
, pp. 291-312
-
-
Zheng, Y.1
-
16
-
-
0040712314
-
Efficient signcryption schemes on elliptic curves
-
Zheng, Y., Imai, H.: Efficient signcryption schemes on elliptic curves. Information Process Letters 68-6, 227-233 (1998)
-
(1998)
Information Process Letters
, vol.68 -6
, pp. 227-233
-
-
Zheng, Y.1
Imai, H.2
-
17
-
-
33646852592
-
-
Choudary Gorantla, M., Saxena, A.: An Efficient Certificateless signature scheme. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Yin., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), 3802, pp. 110-116. Springer, Heidelberg (2005)
-
Choudary Gorantla, M., Saxena, A.: An Efficient Certificateless signature scheme. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Yin., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 110-116. Springer, Heidelberg (2005)
-
-
-
-
18
-
-
84927727752
-
Security Proofs for Signature Scheme
-
Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
-
Pointcheval, D., Stern, J.: Security Proofs for Signature Scheme. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387-398. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
19
-
-
0345490607
-
Certificateless Public Key Cryptology
-
Laih, C.-S, ed, ASIACRYPT 2003, Springer, Heidelberg
-
Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptology. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452-473. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
20
-
-
33744786523
-
-
Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the security of certificateless signature scheme from asicrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, 3810, pp. 13-25. Springer, Heidelberg (2005)
-
Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the security of certificateless signature scheme from asicrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 13-25. Springer, Heidelberg (2005)
-
-
-
-
21
-
-
33746370456
-
-
Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: Key Replacement Attack Against a Generic Construction of Certificateless Signature. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, 4058, pp. 235-246. Springer, Heidelberg (2006)
-
Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: Key Replacement Attack Against a Generic Construction of Certificateless Signature. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 235-246. Springer, Heidelberg (2006)
-
-
-
-
22
-
-
33749421203
-
An Efficient Certificateless signature scheme
-
Zhou, X, Sokolsky, O, Yan, L, Jung, E.-S, Shao, Z, Mu, Y, Lee, D.C, Kim, D, Jeong, Y.-S, Xu, C.-Z, eds, Emerging Directions in Embedded and Ubiquitous Computing, Springer, Heidelberg
-
Yap, W., Heng, S., Goi, B.: An Efficient Certificateless signature scheme. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D., Jeong, Y.-S., Xu, C.-Z. (eds.) Emerging Directions in Embedded and Ubiquitous Computing. LNCS, vol. 4097, pp. 322-331. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4097
, pp. 322-331
-
-
Yap, W.1
Heng, S.2
Goi, B.3
-
23
-
-
35048832495
-
-
Yum, D., Lee, P.: Generic Construction of Certificateless Signature. In: Galindo, F., Takizawa, M., Traunmüller, R. (eds.) DEXA 2004. LNCS, 3180, pp. 200-211. Springer, Heidelberg (2004)
-
Yum, D., Lee, P.: Generic Construction of Certificateless Signature. In: Galindo, F., Takizawa, M., Traunmüller, R. (eds.) DEXA 2004. LNCS, vol. 3180, pp. 200-211. Springer, Heidelberg (2004)
-
-
-
|