-
1
-
-
84876300178
-
-
Au, M.H., Chen, J., Liu, J.K., Mu, Y., Wong, D.S., Yang, G.: Malicious KGC Attacks in Certificateless Cryptography. In: ASIACCS (2007), also available at http://eprint.iacr.org/2006/255
-
Au, M.H., Chen, J., Liu, J.K., Mu, Y., Wong, D.S., Yang, G.: Malicious KGC Attacks in Certificateless Cryptography. In: ASIACCS (2007), also available at http://eprint.iacr.org/2006/255
-
-
-
-
2
-
-
0345490607
-
Certificateless Public Key Cryptography
-
Laih, C.-S, ed, ASIACRYPT 2003, Springer, Heidelberg
-
Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452-473. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
4
-
-
23044435711
-
Short Signatures from the Weil Pairing
-
Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. Journal of Cryptology 17, 297-319 (2004)
-
(2004)
Journal of Cryptology
, vol.17
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
5
-
-
38149060462
-
An Attack on a Certificateless Signature Scheme
-
Available online
-
Cao, X., Paterson, K.G., Kou, W.: An Attack on a Certificateless Signature Scheme. In: Cryptology ePrint Archive. Available online http://eprint.iacr.org/2006/367
-
Cryptology ePrint Archive
-
-
Cao, X.1
Paterson, K.G.2
Kou, W.3
-
6
-
-
38149141898
-
A Survey of Certificateless Encryption Schemes and Security Models
-
Available online
-
Dent, A.W.: A Survey of Certificateless Encryption Schemes and Security Models. In: Cryptology ePrint Archive. Available online: http://eprint.iacr.org/ 2006/211
-
Cryptology ePrint Archive
-
-
Dent, A.W.1
-
8
-
-
0023985465
-
A Secure Digital Signature Scheme
-
Goldwasser, S., Micali, S., Rivest, R.: A Secure Digital Signature Scheme. SIAM Journal on Computing 17, 281-308 (1988)
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
9
-
-
33646852592
-
-
Gorantla, M.C., Saxena, A.: An Efficient Certificateless Signature Scheme. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), 3802, pp. 110-116. Springer, Heidelberg (2005)
-
Gorantla, M.C., Saxena, A.: An Efficient Certificateless Signature Scheme. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 110-116. Springer, Heidelberg (2005)
-
-
-
-
10
-
-
33744786523
-
-
Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the Security of Certificateless Signature Schemes from Asiacrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, 3810, pp. 13-25. Springer, Heidelberg (2005)
-
Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the Security of Certificateless Signature Schemes from Asiacrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 13-25. Springer, Heidelberg (2005)
-
-
-
-
11
-
-
33746370456
-
-
Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: Key Replacement Attack Against a Generic Construction of Certificateless Signature. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, 4058, pp. 235-246. Springer, Heidelberg (2006)
-
Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: Key Replacement Attack Against a Generic Construction of Certificateless Signature. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 235-246. Springer, Heidelberg (2006)
-
-
-
-
12
-
-
84876341103
-
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature/Encryption Scheme in the Standard Model
-
Liu, J.K., Au, M.H., Susilo, W.: Self-Generated-Certificate Public Key Cryptography and Certificateless Signature/Encryption Scheme in the Standard Model. In: 2007 ACM Symposium on InformAtion, Computer and Communications Security - ASIACCS'07 (2007)
-
(2007)
2007 ACM Symposium on InformAtion, Computer and Communications Security - ASIACCS'07
-
-
Liu, J.K.1
Au, M.H.2
Susilo, W.3
-
13
-
-
18244396341
-
Certificateless Signature and Proxy Signature Schemes from Bilinear Pairings
-
Li, X., Chen, K., Sun, L.: Certificateless Signature and Proxy Signature Schemes from Bilinear Pairings. Lithuanian Mathematical Journal 45, 76-83 (2005)
-
(2005)
Lithuanian Mathematical Journal
, vol.45
, pp. 76-83
-
-
Li, X.1
Chen, K.2
Sun, L.3
-
14
-
-
38149083661
-
-
Park, Je. H.: An Attack on the Certificateless Signature Scheme from EUC Workshops 2006. In: Cryptology ePrint Archive. Available online: http://eprint.iacr.org/2006/442
-
Park, Je. H.: An Attack on the Certificateless Signature Scheme from EUC Workshops 2006. In: Cryptology ePrint Archive. Available online: http://eprint.iacr.org/2006/442
-
-
-
-
15
-
-
0000901529
-
Security Arguments for Digital Signatures and Blind Signatures
-
Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology 13(3), 361-396 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
16
-
-
85020598353
-
Identity-based Cryptosystems and Signature Schemes
-
Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
-
Shamir, A.: Identity-based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
17
-
-
35048832495
-
-
Yum, D.H., Lee, P.J.: Generic Construction of Certificateless Signature. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, 3108, pp. 200-211. Springer, Heidelberg (2004)
-
Yum, D.H., Lee, P.J.: Generic Construction of Certificateless Signature. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 200-211. Springer, Heidelberg (2004)
-
-
-
-
18
-
-
33749421203
-
An Efficient Certificateless Signature Scheme
-
Zhou, X, Sokolsky, O, Yan, L, Jung, E.-S, Shao, Z, Mu, Y, Lee, D.C, Kim, D, Jeong, Y.-S, Xu, C.-Z, eds, Emerging Directions in Embedded and Ubiquitous Computing, Springer, Heidelberg
-
Yap, W.-S., Heng, S.-H., Goi, B.-M.: An Efficient Certificateless Signature Scheme. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D., Jeong, Y.-S., Xu, C.-Z. (eds.) Emerging Directions in Embedded and Ubiquitous Computing. LNCS, vol. 4097, pp. 322-331. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4097
, pp. 322-331
-
-
Yap, W.-S.1
Heng, S.-H.2
Goi, B.-M.3
-
19
-
-
33746591632
-
-
Zhang, Z., Wong, D.: Certificateless Public-Key Signature: Security Model and Efficient Construction. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, 3989, pp. 293-308. Springer, Heidelberg (2006)
-
Zhang, Z., Wong, D.: Certificateless Public-Key Signature: Security Model and Efficient Construction. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 293-308. Springer, Heidelberg (2006)
-
-
-
-
20
-
-
38149129644
-
Key Replacement Attack on a Certificateless Signature Scheme
-
Available online
-
Zhang, Z., Feng, D.: Key Replacement Attack on a Certificateless Signature Scheme. In: Cryptology ePrint Archive. Available online http://eprint.iacr.org/2006/453
-
Cryptology ePrint Archive
-
-
Zhang, Z.1
Feng, D.2
|