-
1
-
-
84956857891
-
A signature scheme with message recovery as secure as discrete logarithm
-
Lam, K.-Y, Okamoto, E, Xing, C, eds, ASIACRYPT 1999, Springer, Heidelberg
-
Abe, M., Okamoto, T.: A signature scheme with message recovery as secure as discrete logarithm. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol. 1716, pp. 378-389. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1716
, pp. 378-389
-
-
Abe, M.1
Okamoto, T.2
-
2
-
-
84958948780
-
-
Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, 1431, pp. 55-59. Springer, Heidelberg (1998)
-
Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 55-59. Springer, Heidelberg (1998)
-
-
-
-
4
-
-
33646820668
-
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
-
Atkinson, C, Bunse, C, Gross, H.-G, Peper, C, eds, ASIACRYPT 2005, Springer, Heidelberg
-
Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Atkinson, C., Bunse, C., Gross, H.-G., Peper, C. (eds.) ASIACRYPT 2005. LNCS, vol. 3778, pp. 515-532. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3778
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.4
-
6
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
84946840347
-
Short signatures from the weil pairing
-
Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514-533. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 514-533
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
8
-
-
35248874429
-
Multipurpose identity-based signcryption: A Swiss army knife for identity-based cryptography
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Boyen, X.: Multipurpose identity-based signcryption: a Swiss army knife for identity-based cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 382-398. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 382-398
-
-
Boyen, X.1
-
9
-
-
3743065985
-
Signature with message recovery
-
Chen, K.: Signature with message recovery. Electronics Leters 34(20), 1934 (1998)
-
(1998)
Electronics Leters
, vol.34
, Issue.20
, pp. 1934
-
-
Chen, K.1
-
10
-
-
24144498013
-
-
Chen; L., Lee, J.M.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 362-379. Springer, Heidelberg (2005)
-
Chen; L., Lee, J.M.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 362-379. Springer, Heidelberg (2005)
-
-
-
-
11
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing 17(2), 281-308 (1988)
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
12
-
-
84934275826
-
Authenticated encyprtion scheme with low communication costs
-
Horster, P., Michels, M., Petersen, H.: Authenticated encyprtion scheme with low communication costs. Electronics Letters 30(15), 1212-1213 (1994)
-
(1994)
Electronics Letters
, vol.30
, Issue.15
, pp. 1212-1213
-
-
Horster, P.1
Michels, M.2
Petersen, H.3
-
13
-
-
0029375592
-
Publicly verifiable authenticated encryption
-
Lee, W.-B., Chang, C.-C.: Publicly verifiable authenticated encryption. Electronics Letters 31(19), 1656-1657 (1995)
-
(1995)
Electronics Letters
, vol.31
, Issue.19
, pp. 1656-1657
-
-
Lee, W.-B.1
Chang, C.-C.2
-
14
-
-
84955571277
-
-
Miyaji, A.: A message recovery signature scheme equivalent to DSA over elliptic curves. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, 1163, pp. 1-14. Springer, Heidelberg (1996)
-
Miyaji, A.: A message recovery signature scheme equivalent to DSA over elliptic curves. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 1-14. Springer, Heidelberg (1996)
-
-
-
-
16
-
-
84948973239
-
Message recovery for signature schemes based on the discrete logarithm problem
-
De Santis, A, ed, EUROCRYPT 1994, Springer, Heidelberg
-
Nyberg, K., Ruepple, R.A.: Message recovery for signature schemes based on the discrete logarithm problem. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 182-193. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.950
, pp. 182-193
-
-
Nyberg, K.1
Ruepple, R.A.2
-
17
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. Journal of Cryptology 13(3), 361-396 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
18
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21, 120-126 (1978)
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
19
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
20
-
-
38349041007
-
Digital signature with message recovery and authenticated encryption (signcryption)- a comparison
-
Walker, M, ed, Cryptography and Coding, Springer, Heidelberg
-
Yeun, C.Y.: Digital signature with message recovery and authenticated encryption (signcryption)- a comparison. In: Walker, M. (ed.) Cryptography and Coding. LNCS, vol. 1746, pp. 307-312. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1746
, pp. 307-312
-
-
Yeun, C.Y.1
-
21
-
-
26444568207
-
-
Zhang, F., Susilo, W., Mu, Y.: Identity-based partial message recovery signatures (or How to shorten ID-based signatures). In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, 3570, pp. 45-56. Springer, Heidelberg (2005)
-
Zhang, F., Susilo, W., Mu, Y.: Identity-based partial message recovery signatures (or How to shorten ID-based signatures). In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 45-56. Springer, Heidelberg (2005)
-
-
-
-
22
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption << cost (signature) + cost (encryption)
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption << cost (signature) + cost (encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165-179. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
23
-
-
35048841300
-
Efficient Selective ID Secure Identity Based Encryption without Random Oracles
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient Selective ID Secure Identity Based Encryption without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
|