-
1
-
-
85020598353
-
Identity Based Cryptosystems and Signature Schemes
-
Advances in Cryptology-CRYPTO, of, Spinger
-
A. Shamir. Identity Based Cryptosystems and Signature Schemes. In Advances in Cryptology-CRYPTO, volume 196 of LNCS, pages 37-53. Spinger. 1984.
-
(1984)
LNCS
, vol.196
, pp. 37-53
-
-
Shamir, A.1
-
2
-
-
84874324906
-
-
D. Boneh, F. Franklin.Identity-based encryption from the Weil pairing. Advances in Cryptology-Crypto'2001, Lncs 2139, pages 213-229. Springer-Verlag, 2001.
-
D. Boneh, F. Franklin.Identity-based encryption from the Weil pairing. Advances in Cryptology-Crypto'2001, Lncs 2139, pages 213-229. Springer-Verlag, 2001.
-
-
-
-
3
-
-
33646820668
-
-
Paulo S.L.M. Barreto, Benoit Libert, Noel McCullagh and Jaen-Jacques Quisquater. Efficient and provably-secure identity-based signature and signcryption from bilinear maps. In Bimal Roy, editor, ASIACRYPT. 3788 of Lecture Notes in Computer Science, pages 515-532. Springer, 2005.
-
Paulo S.L.M. Barreto, Benoit Libert, Noel McCullagh and Jaen-Jacques Quisquater. Efficient and provably-secure identity-based signature and signcryption from bilinear maps. In Bimal Roy, editor, ASIACRYPT. volume 3788 of Lecture Notes in Computer Science, pages 515-532. Springer, 2005.
-
-
-
-
4
-
-
50249136163
-
-
Byoungcheon Lee, Colin Boyd. Ed Dawson, Kwangji Kim, Jeongmo Yang and Seungjae Yoo. Secure key issuing in idbased cryptography. In James M. Hogan, Paul Montague, Martin K. Purvis and Chris Steketee, editors. ACSW frontiers, 32 of CRPIT. pages 69-74. Australian Computer Society, 2004.
-
Byoungcheon Lee, Colin Boyd. Ed Dawson, Kwangji Kim, Jeongmo Yang and Seungjae Yoo. Secure key issuing in idbased cryptography. In James M. Hogan, Paul Montague, Martin K. Purvis and Chris Steketee, editors. ACSW frontiers, volume 32 of CRPIT. pages 69-74. Australian Computer Society, 2004.
-
-
-
-
5
-
-
38049125096
-
Reducing Trust in the PKG in Identity Based Cryptosystems
-
Advances in Cryptology, CRYPTO, of, Springer
-
Vipul Goyal. Reducing Trust in the PKG in Identity Based Cryptosystems. In Advances in Cryptology - CRYPTO 2007, volume 4450 of Lecture Notes in Computer Science, pages 430-447. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4450
, pp. 430-447
-
-
Goyal, V.1
-
6
-
-
84944050090
-
-
Chen, L., Harrison, K.. Smart, N. P. and Solera, D., Applications of multiple trust authorities in pairing based cryptosystems', InfraSec 2002, Lncs 2437, Springer-Verlag, pp.260-275.
-
Chen, L., Harrison, K.. Smart, N. P. and Solera, D., Applications of multiple trust authorities in pairing based cryptosystems', InfraSec 2002, Lncs 2437, Springer-Verlag, pp.260-275.
-
-
-
-
7
-
-
35248866223
-
-
Craig Gentry. Certificate-based encryption and the certificate revocation problem. In Eli Biham, editor, EUROCRYPT 2003, 2656 of Lecture Notes in Computer Science, pages 272-293. Springer, 2003.
-
Craig Gentry. Certificate-based encryption and the certificate revocation problem. In Eli Biham, editor, EUROCRYPT 2003, volume 2656 of Lecture Notes in Computer Science, pages 272-293. Springer, 2003.
-
-
-
-
8
-
-
0345490607
-
-
Sattam S. Al-Riyami and Kenneth G. Paterson. Certificate-less public key cryptography. In Chi-Sung Laih. editor. ASI-ACRYPT. 2894 of Lecture Notes in Computer Science, pages 452-473. Springer. 2003.
-
Sattam S. Al-Riyami and Kenneth G. Paterson. Certificate-less public key cryptography. In Chi-Sung Laih. editor. ASI-ACRYPT. volume 2894 of Lecture Notes in Computer Science, pages 452-473. Springer. 2003.
-
-
-
-
9
-
-
85024290278
-
-
David Chaum and Eugène van heyst. Group signatures. In Advances in Cryptology-EUROCRYPT 1991, 547 of Lecture Notes in Computer Science, pages 257-65. Springer-Verlag, 1991.
-
David Chaum and Eugène van heyst. Group signatures. In Advances in Cryptology-EUROCRYPT 1991, volume 547 of Lecture Notes in Computer Science, pages 257-65. Springer-Verlag, 1991.
-
-
-
-
10
-
-
33746042155
-
Compact group signatures without random oracles
-
Advances in Cryptology-EUROCRYPT, of, Springer-Verlag
-
Xavier Boyen and Brent Waters. Compact group signatures without random oracles. In Advances in Cryptology-EUROCRYPT 2006, volume 4004 of Lecture Notes in Computer Science, pages 427-444. Springer-Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4004
, pp. 427-444
-
-
Boyen, X.1
Waters, B.2
-
12
-
-
46749145666
-
Susan Hohenberger, and Breno de Medeiros. Practical group signatures without random oracle. Cryptology eprint Archive
-
Report 2005/385
-
Giuseppe Ateniese, Jan Camenisch, Susan Hohenberger, and Breno de Medeiros. Practical group signatures without random oracle. Cryptology eprint Archive, Report 2005/385, 2005. http://eprint.iacr.org/.
-
(2005)
-
-
Ateniese, G.1
Camenisch, J.2
-
13
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Advances in Cryptology-EUROCRYPT, of, Springer-Verlag
-
Brent Waters. Efficient identity-based encryption without random oracles. In Advances in Cryptology-EUROCRYPT 2005, volume 3494 of Lecture Notes in Computer Science, pages 427-444. Springer-Verlag. 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 427-444
-
-
Waters, B.1
-
14
-
-
33746372179
-
-
Kenneth G. Paterson and Jacob C.N. Schuldt. Efficient identity-based signature secure in the standard model. ACISP 2006. 4058 of Lecture Notes in Computer Science, pages 207-222. Springer, 2006.
-
Kenneth G. Paterson and Jacob C.N. Schuldt. Efficient identity-based signature secure in the standard model. ACISP 2006. volume 4058 of Lecture Notes in Computer Science, pages 207-222. Springer, 2006.
-
-
-
-
15
-
-
50249167827
-
-
C. Castelluccia. How to convert any ID-based signature scheme into a group signature scheme. Cryptology ePrint Archive, Report 2002.
-
C. Castelluccia. How to convert any ID-based signature scheme into a group signature scheme. Cryptology ePrint Archive, Report 2002.
-
-
-
-
16
-
-
35048832495
-
-
D. H. Yum and P. J. Lee. Generic construction of certificate-less signature. In Information Security and Privacy: 9th Australian Conference. ACISP 2004, 3108 of Lecture Notes in computer Science, pages 200-211. Spinger-Verlag, 2004.
-
D. H. Yum and P. J. Lee. Generic construction of certificate-less signature. In Information Security and Privacy: 9th Australian Conference. ACISP 2004, volume 3108 of Lecture Notes in computer Science, pages 200-211. Spinger-Verlag, 2004.
-
-
-
-
17
-
-
33744786523
-
On the security of certificateless signature scheme from Asiacrypto 2003
-
Spinger-Verlag
-
X. Huang. W. Susilo, Y. Mu and F. Zhang. On the security of certificateless signature scheme from Asiacrypto 2003. In cryptology and network Security, 4th International Conference, CANS2005, volune 3810 of Lecture notes in computer Science, pages 13-25. Spinger-Verlag, 2005.
-
(2005)
cryptology and network Security, 4th International Conference, CANS2005, volune 3810 of Lecture notes in computer Science
, pp. 13-25
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
18
-
-
33745833916
-
On constructing certificateless cryptosystems from identity based encryption
-
9th International Conference on Theory and Practice in Public Key Cryptography, PKC2006, of, Springer- Verlag
-
B. Libert and J.-J. Quisquater. On constructing certificateless cryptosystems from identity based encryption. In 9th International Conference on Theory and Practice in Public Key Cryptography, PKC2006, volume 3958 of Lecture Notes in Computer Science, pages 474-490. Springer- Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3958
, pp. 474-490
-
-
Libert, B.1
Quisquater, J.-J.2
-
19
-
-
33746370456
-
-
B. C. Hu, D. S. Wong, Z. Zhang, and X. Deng. Key replacement attack against a generic construction of certificateless signature. In Information Security and Privacy: 11th Australian Conference. ACISP 2006, 3108 of Lecture Notes in computer Science, pages 235-246. Spinger-Verlag, 2006.
-
B. C. Hu, D. S. Wong, Z. Zhang, and X. Deng. Key replacement attack against a generic construction of certificateless signature. In Information Security and Privacy: 11th Australian Conference. ACISP 2006, volume 3108 of Lecture Notes in computer Science, pages 235-246. Spinger-Verlag, 2006.
-
-
-
-
20
-
-
84876300178
-
Malicious KGC attacks in certificateless cryptosystems
-
To appear in, also at
-
M. H. Au, J. Chen, J. K. Liu. Y. M. D. S. Wong, and G. Yang. Malicious KGC attacks in certificateless cryptosystems. To appear in ACM ASIACCS 2007, also at http://eprint.iacr.org/2006/255.
-
(2007)
ACM ASIACCS
-
-
Au, M.H.1
Chen, J.2
Liu, J.K.3
Wong, Y.M.D.S.4
Yang, G.5
-
21
-
-
84937570422
-
-
M. Girault. Self-Certified public keys. In Proc. EUROCRYPT91. LNCS 547.pages 490-497, Springer-Verlag, 1992.
-
M. Girault. Self-Certified public keys. In Proc. EUROCRYPT91. LNCS 547.pages 490-497, Springer-Verlag, 1992.
-
-
-
-
22
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
Advances in Cryptology-EUROCRYPT, of, Springer-Verlag
-
Mihir Bellare, Daniele Micciancio, and Bogdan Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In Advances in Cryptology-EUROCRYPT 2003, volume 2656 of Lecture Notes in Computer Science, pages 614-29. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
23
-
-
33645958856
-
-
J.Baek, R. Safavi-Naini, and W. Susilo. Certificateless public key encryption without pairing. In ISC 05, pages 134-148. Springer-Verlag, 2005. Lecture Notes in Computer Science 3650.
-
J.Baek, R. Safavi-Naini, and W. Susilo. Certificateless public key encryption without pairing. In ISC 05, pages 134-148. Springer-Verlag, 2005. Lecture Notes in Computer Science Vol. 3650.
-
-
-
-
24
-
-
84876341103
-
Self-generated-certificate public key cryptography and certificateless signature/encryption schemes in the standard model
-
To appear in
-
J. K. Liu. M. H. Au, Willy Susilo. Self-generated-certificate public key cryptography and certificateless signature/encryption schemes in the standard model. To appear in ACM ASIACCS 2007.
-
(2007)
ACM ASIACCS
-
-
Liu, J.K.1
Au, M.H.2
Susilo, W.3
-
25
-
-
84876300178
-
Malicious KGC attacks in certificateless cryptosystems
-
To appear in, also at
-
M. H. Au, J. Chen, J. K. Liu, Y. M. D. S. Wong, and G. Yang. Malicious KGC attacks in certificateless cryptosystems. To appear in ACM ASIACCS 2007, also at http:// eprint.iacr.org/2006/255.
-
(2007)
ACM ASIACCS
-
-
Au, M.H.1
Chen, J.2
Liu, J.K.3
Wong, Y.M.D.S.4
Yang, G.5
|