-
1
-
-
85020598353
-
Identity-based cryptosystem and signature scheme
-
Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystem and signature scheme. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 120-126. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 120-126
-
-
Shamir, A.1
-
2
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature)+cost (encryption)
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature)+cost (encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165-179. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
4
-
-
84958948780
-
-
Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, 1431, pp. 55-59. Springer, Heidelberg (1998)
-
Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 55-59. Springer, Heidelberg (1998)
-
-
-
-
5
-
-
0040712314
-
How to construct efficient signcryption schemes on elliptic curves
-
Zheng, Y., Imai, H.: How to construct efficient signcryption schemes on elliptic curves. Information Processing Letters 68(5), 227-233 (1998)
-
(1998)
Information Processing Letters
, vol.68
, Issue.5
, pp. 227-233
-
-
Zheng, Y.1
Imai, H.2
-
6
-
-
34347373013
-
-
Malone-Lee, J., Mao, W.: Two birds one stone: signcryption using RSA. In: Joye, M. (ed.) CT-RSA 2003. LNCS, 2612, pp. 211-226. Springer, Heidelberg (2003)
-
Malone-Lee, J., Mao, W.: Two birds one stone: signcryption using RSA. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 211-226. Springer, Heidelberg (2003)
-
-
-
-
7
-
-
84900011086
-
-
Information Security Application-WISA
-
Jung, H.Y., Lee, D.H., Lim, J.I., Chang, K.S.: New DSA-verifiable signcryption schemes. Information Security Application-WISA 2001, pp. 463-475 (2001)
-
(2001)
New DSA-verifiable signcryption schemes
, pp. 463-475
-
-
Jung, H.Y.1
Lee, D.H.2
Lim, J.I.3
Chang, K.S.4
-
8
-
-
0242445175
-
Identity based signcryption. Cryptology ePrint Archive
-
Report 2002/098
-
Malone-Lee, J.: Identity based signcryption. Cryptology ePrint Archive. Report 2002/098 (2002)
-
(2002)
-
-
Malone-Lee, J.1
-
9
-
-
84939205648
-
A new identity based signcryption scheme from pairings
-
Paris, France, pp
-
Libert, B., Quisquator, J.J.: A new identity based signcryption scheme from pairings. In: 2003 IEEE information theory workshop. Paris, France, pp. 155-158 (2003)
-
(2003)
2003 IEEE information theory workshop
, pp. 155-158
-
-
Libert, B.1
Quisquator, J.J.2
-
10
-
-
35048854673
-
-
Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Lim, J.-L, Lee, D.-H. (eds.) ICISC 2003. LNCS, 2971, pp. 352-369. Springer, Heidelberg (2004)
-
Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Lim, J.-L, Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352-369. Springer, Heidelberg (2004)
-
-
-
-
11
-
-
35248874429
-
Multipurpose identity based signcryption: A swiss army knife for identity based cryptography
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Boyen, X.: Multipurpose identity based signcryption: a swiss army knife for identity based cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 383-399. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 383-399
-
-
Boyen, X.1
-
12
-
-
24144498013
-
-
Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 362-379. Springer, Heidelberg (2005)
-
Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 362-379. Springer, Heidelberg (2005)
-
-
-
-
13
-
-
33646820668
-
Efficient and provably-secure identity based signatures and signcryption from bilinear maps
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.J.: Efficient and provably-secure identity based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515-532. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.J.4
-
14
-
-
84947929166
-
-
Zheng, Y.: Signcryption and its applications in efficient public key solutions. In: Okamoto, E. (ed.) ISW 1997. LNCS, 1396, pp. 291-312. Springer, Heidelberg (1998)
-
Zheng, Y.: Signcryption and its applications in efficient public key solutions. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 291-312. Springer, Heidelberg (1998)
-
-
-
-
15
-
-
33746324583
-
-
Duan, S., Cao, Z.: Efficient and provably secure multi-receiver identity-based signcryption. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, 4058, pp. 195-206. Springer, Heidelberg (2006)
-
Duan, S., Cao, Z.: Efficient and provably secure multi-receiver identity-based signcryption. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 195-206. Springer, Heidelberg (2006)
-
-
-
-
16
-
-
24144432124
-
-
Baek, J., Safavi-Naini, R., Susilo, W.: Efficient multi-receiver identity based encryption and its application to broad encryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 380-397. Springer, Heidelberg (2005)
-
Baek, J., Safavi-Naini, R., Susilo, W.: Efficient multi-receiver identity based encryption and its application to broad encryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 380-397. Springer, Heidelberg (2005)
-
-
-
-
17
-
-
24144434019
-
-
Yuen, T.H., Wei, V.K.: Fast and proven secure blind identity based signcryption from pairings. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, 3376, pp. 305-322. Springer, Heidelberg (2005)
-
Yuen, T.H., Wei, V.K.: Fast and proven secure blind identity based signcryption from pairings. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 305-322. Springer, Heidelberg (2005)
-
-
-
-
18
-
-
0035336179
-
New explicit conditions of elliptic curve trace for FR-reduction
-
Miyaji, A., Nakabayashi, M., Takano, S.: New explicit conditions of elliptic curve trace for FR-reduction. IEICE Tranctions on Fundamentals E84-A(5), 1234-1243 (2001)
-
(2001)
IEICE Tranctions on Fundamentals
, vol.E84-A
, Issue.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
19
-
-
84937428623
-
Efficient algorithms for pairingbased cryptosystems
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairingbased cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354-368. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
20
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
21
-
-
34047151805
-
On computable isomorphisms in efficient pairing based systems. Cryptology ePrint Archive
-
Report 2005/116
-
Smart, N.P., Vercauteren, F.: On computable isomorphisms in efficient pairing based systems. Cryptology ePrint Archive, Report 2005/116 (2005) http://eprint.iacr.org/2005/116
-
(2005)
-
-
Smart, N.P.1
Vercauteren, F.2
-
22
-
-
35048848152
-
Short signatures without random oracles
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
23
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracles
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient selective-ID secure identity based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
|