-
1
-
-
84947237328
-
On the security of joint signature and encryption
-
Advances in Cryptology-EUROCRYPT 2002, Springer-Verlag
-
J.H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In Advances in Cryptology-EUROCRYPT 2002, LNCS 2332, pp. 83-107, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
2
-
-
84958982846
-
Formal proofs for the security of signcryption
-
Public Key Cryptography-PKC 2002, Springer-Verlag
-
J. Baek, R. Steinfeld, and Y. Zheng. Formal proofs for the security of signcryption. In Public Key Cryptography-PKC 2002, LNCS 2274, pp. 80-98, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2274
, pp. 80-98
-
-
Baek, J.1
Steinfeld, R.2
Zheng, Y.3
-
3
-
-
84958948780
-
A signcryption scheme with signature directly verifiable by public key
-
Public Key Cryptography-PKC'98, Springer-Verlag
-
F. Bao and R.H. Deng. A signcryption scheme with signature directly verifiable by public key. In Public Key Cryptography-PKC'98, LNCS 1431, pp. 55-59, Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1431
, pp. 55-59
-
-
Bao, F.1
Deng, R.H.2
-
4
-
-
33646820668
-
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
-
Advances in Cryptology-ASIACRYPT 2005, Springer-Verlag
-
P.S.L.M. Barreto, B. Libert, N. McCullagh, and J.J. Quisquater. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In Advances in Cryptology-ASIACRYPT 2005, LNCS 3788, pp. 515-532, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3788
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.J.4
-
6
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advances in Cryptology-CRYPTO 2001, Springer-Verlag
-
D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. In Advances in Cryptology-CRYPTO 2001, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
35248874429
-
Multipurpose identity-based signcryption: A Swiss army knife for identity-based cryptography
-
Advances in Cryptology-CRYPTO 2003, Springer-Verlag
-
X. Boyen. Multipurpose identity-based signcryption: a Swiss army knife for identity-based cryptography. In Advances in Cryptology-CRYPTO 2003, LNCS 2729, pp. 383-399, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 383-399
-
-
Boyen, X.1
-
8
-
-
84942246351
-
Identity based authenticated key agreement protocols from pairings
-
Pacific Grove, USA
-
L. Chen and C. Kudla. Identity based authenticated key agreement protocols from pairings. In 16th IEEE Computer Security Foundations Workshop-CSFW'03, pp. 219-233, Pacific Grove, USA, 2003.
-
(2003)
16th IEEE Computer Security Foundations Workshop-CSFW'03
, pp. 219-233
-
-
Chen, L.1
Kudla, C.2
-
9
-
-
24144498013
-
Improved identity-based signcryption
-
Public Key Cryptography-PKC 2005, Springer-Verlag
-
L. Chen and J. Malone-Lee. Improved identity-based signcryption. In Public Key Cryptography-PKC 2005, LNCS 3386, pp. 362-379, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3386
, pp. 362-379
-
-
Chen, L.1
Malone-Lee, J.2
-
10
-
-
35048854673
-
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
-
Information Security and Cryptology-ICISC 2003, Springer-Verlag
-
S.S.M. Chow, S.M. Yiu, L.C.K. Hui, and K.P. Chow. Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In Information Security and Cryptology-ICISC 2003, LNCS 2971, pp. 352-369, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.2971
, pp. 352-369
-
-
Chow, S.S.M.1
Yiu, S.M.2
Hui, L.C.K.3
Chow, K.P.4
-
11
-
-
7744232568
-
TIDS: Threshold and identity-based security scheme for wireless ad hoc networks
-
H. Deng and D.P. Agrawal. TIDS: threshold and identity-based security scheme for wireless ad hoc networks. Ad Hoc Networks, Vol. 2, No. 3, pp. 291-307, 2004.
-
(2004)
Ad Hoc Networks
, vol.2
, Issue.3
, pp. 291-307
-
-
Deng, H.1
Agrawal, D.P.2
-
12
-
-
35048817852
-
Encrypted message authentication by firewalls
-
Public Key Cryptography-PKC'99, Springer-Verlag
-
C. Gamage, J. Leiwo, and Y. Zheng. Encrypted message authentication by firewalls. In Public Key Cryptography-PKC'99, LNCS 1560, pp. 69-81, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1560
, pp. 69-81
-
-
Gamage, C.1
Leiwo, J.2
Zheng, Y.3
-
13
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Selected Areas in Cryptography-SAC 2002, Springer-Verlag
-
F. Hess. Efficient identity based signature schemes based on pairings. In Selected Areas in Cryptography-SAC 2002, LNCS 2595, pp. 310-324, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
14
-
-
4644332974
-
Signcryption schemes with forward secrecy
-
Seoul, Korea
-
H.Y. Jung, D.H. Lee, J.I. Lim, and K.S. Chang. Signcryption schemes with forward secrecy. In Information Security Application-WISA 2001, pp. 463-475, Seoul, Korea, 2001.
-
(2001)
Information Security Application-WISA 2001
, pp. 463-475
-
-
Jung, H.Y.1
Lee, D.H.2
Lim, J.I.3
Chang, K.S.4
-
15
-
-
0034449692
-
Distributed network management for coalition deployments
-
Los Angeles, USA
-
D. Kidston and J. Robinson. Distributed network management for coalition deployments. In 21st Century Military Communications Conference-MILCOM 2000, Vol. 1, pp. 460-464, Los Angeles, USA, 2000.
-
(2000)
21st Century Military Communications Conference-MILCOM 2000
, vol.1
, pp. 460-464
-
-
Kidston, D.1
Robinson, J.2
-
16
-
-
33646720921
-
Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment
-
Information and Communications Security-ICICS 2005, Springer-Verlag
-
S. Kim, H. Lee, and H. Oh. Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment. In Information and Communications Security-ICICS 2005, LNCS 3783, pp. 323-335, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3783
, pp. 323-335
-
-
Kim, S.1
Lee, H.2
Oh, H.3
-
17
-
-
24944514037
-
Identity-based key agreement protocols in a multiple PKG environment
-
Computational Science and Its Applications-ICCSA 2005, Springer-Verlag
-
H. Lee, D. Kim, S. Kim, and H. Oh. Identity-based key agreement protocols in a multiple PKG environment. In Computational Science and Its Applications-ICCSA 2005, LNCS 3483, pp. 877-886, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3483
, pp. 877-886
-
-
Lee, H.1
Kim, D.2
Kim, S.3
Oh, H.4
-
18
-
-
26844533458
-
A new scheme for key management in ad hoc networks
-
4th International Conference on Networking-ICN 2005, Springer-Verlag
-
G. Li and W. Han. A new scheme for key management in ad hoc networks. In 4th International Conference on Networking-ICN 2005, LNCS 3421, pp. 242-249, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3421
, pp. 242-249
-
-
Li, G.1
Han, W.2
-
19
-
-
84939205648
-
A new identity based signcryption schemes from pairings
-
Paris, France
-
B. Libert and J.J. Quisquater. A new identity based signcryption schemes from pairings. In 2003 IEEE information theory workshop, pp. 155-158, Paris, France, 2003.
-
(2003)
2003 IEEE information theory workshop
, pp. 155-158
-
-
Libert, B.1
Quisquater, J.J.2
-
20
-
-
38049032761
-
-
J. Malone-Lee. Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, 2002. Available from: http://eprint.iacr.org/2002/ 098.
-
J. Malone-Lee. Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, 2002. Available from: http://eprint.iacr.org/2002/ 098.
-
-
-
-
21
-
-
34347373013
-
Two birds one stone: Signcryption using RSA
-
Topics in Cryptology-CT-RSA 2003, Springer-Verlag
-
J. Malone-Lee and W. Mao. Two birds one stone: signcryption using RSA. In Topics in Cryptology-CT-RSA 2003, LNCS 2612, pp. 211-226, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2612
, pp. 211-226
-
-
Malone-Lee, J.1
Mao, W.2
-
22
-
-
84947723598
-
Distributed signcryption
-
Progress in Cryptology-INDOCRYPT 2000, Springer-Verlag
-
Y. Mu and V. Varadharajan. Distributed signcryption. In Progress in Cryptology-INDOCRYPT 2000, LNCS 1977, pp. 155-164, Springer-Verlag, 2000.
-
(1977)
LNCS
, pp. 155-164
-
-
Mu, Y.1
Varadharajan, V.2
-
23
-
-
13944275248
-
ISSRP: A secure routing protocol using identity-based signcryption scheme in ad-hoc networks
-
Parallel and Distributed Computing: Applications and Technologies-PDCAT 2004, Springer-Verlag
-
B.N. Park, J. Myung, and W. Lee. ISSRP: a secure routing protocol using identity-based signcryption scheme in ad-hoc networks. In Parallel and Distributed Computing: Applications and Technologies-PDCAT 2004, LNCS 3320, pp. 711-714, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3320
, pp. 711-714
-
-
Park, B.N.1
Myung, J.2
Lee, W.3
-
24
-
-
25844478002
-
ISMANET: A secure routing protocol using identity-based signcryption scheme for mobile ad-hoc networks
-
B.N. Park and W. Lee. ISMANET: a secure routing protocol using identity-based signcryption scheme for mobile ad-hoc networks. IEICE Transactions on Communications, Vol. E88-B, No. 6, pp. 2548-2556, 2005.
-
(2005)
IEICE Transactions on Communications
, vol.E88-B
, Issue.6
, pp. 2548-2556
-
-
Park, B.N.1
Lee, W.2
-
25
-
-
84865636074
-
Electronic funds transfer protocol using domain-verifiable signcryption scheme
-
Information Security and Cryptology-ICISC'99, Springer-Verlag
-
M. Seo and K. Kim. Electronic funds transfer protocol using domain-verifiable signcryption scheme. In Information Security and Cryptology-ICISC'99, LNCS 1787, pp. 269-277, Springer-Verlag, 1999.
-
(1787)
LNCS
, pp. 269-277
-
-
Seo, M.1
Kim, K.2
-
26
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptology-CRYPTO'84, Springer-Verlag
-
A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology-CRYPTO'84, LNCS 196, pp. 47-53, Springer-Verlag, 1984.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
27
-
-
84949961454
-
New signcryption schemes based on KCDSA
-
Information Security and Cryptology-ICISC 2001, Springer-Verlag
-
D.H. Yum and P.J. Lee. New signcryption schemes based on KCDSA. In Information Security and Cryptology-ICISC 2001, LNCS 2288, pp. 305-317, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2288
, pp. 305-317
-
-
Yum, D.H.1
Lee, P.J.2
-
28
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption) cost (signature) + cost (encryption)
-
Advances in Cryptology-CRYPTO'97, Springer-Verlag
-
Y. Zheng. Digital signcryption or how to achieve cost (signature & encryption) « cost (signature) + cost (encryption). In Advances in Cryptology-CRYPTO'97, LNCS 1294, pp. 165-179, Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
29
-
-
0040712314
-
How to construct efficient signcryption schemes on elliptic curves
-
Y. Zheng and H. Imai. How to construct efficient signcryption schemes on elliptic curves. Information Processing Letters, Vol. 68, No.5, pp. 227-233, 1998.
-
(1998)
Information Processing Letters
, vol.68
, Issue.5
, pp. 227-233
-
-
Zheng, Y.1
Imai, H.2
|