-
1
-
-
0036684150
-
PKI: It's not dead, just resting
-
P. Gutmann, "PKI: It's not dead, just resting," IEEE Computer, vol. 35, 8, 2002, pp. 41 - 49.
-
(2002)
IEEE Computer
, vol.35
, Issue.8
, pp. 41-49
-
-
Gutmann, P.1
-
2
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptology, CRYPTO 1984, Springer-Verlag, Berlin
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in: Advances in Cryptology - CRYPTO 1984, Lecture Notes in Computer Science, Vol. 196, Springer-Verlag, Berlin, 1984, pp. 47 - 53.
-
(1984)
Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
3
-
-
0345490607
-
Certificateless public key cryptography
-
Advances in Cryptology, ASIACRYPT 2003, Springer-Verlag, Berlin
-
S. Al-Riyami and K. Paterson, "Certificateless public key cryptography," in: Advances in Cryptology - ASIACRYPT 2003, Lecture Notes in Computer Science, Vol. 2894, Springer-Verlag, Berlin, 2003, pp. 452 - 473.
-
(2003)
Lecture Notes in Computer Science
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.1
Paterson, K.2
-
4
-
-
33746591632
-
-
Z. Zhang, J. Xu and D. Feng, Certificateless public-key signature: security model and efficient construction, in: Advances in ACNS 2006, Lecture Notes in Computer Science: 3989[C]. Berlin: Springer-Verlag, 2006, pp. 293 - 308.
-
Z. Zhang, J. Xu and D. Feng, "Certificateless public-key signature: security model and efficient construction," in: Advances in ACNS 2006, Lecture Notes in Computer Science: Vol 3989[C]. Berlin: Springer-Verlag, 2006, pp. 293 - 308.
-
-
-
-
5
-
-
33746370456
-
-
B. Hu, D. Wong, Z. Zhang and X. Deng, Key replace-ment attack against a generic construction of certificateless signature, in: Advances in Privacy ACISP 2006, Lecture Notes in Computer Science: 4058[C]. Berlin: Springer-Verlag, 2006, pp. 235 - 246.
-
B. Hu, D. Wong, Z. Zhang and X. Deng, "Key replace-ment attack against a generic construction of certificateless signature," in: Advances in Privacy ACISP 2006, Lecture Notes in Computer Science: Vol 4058[C]. Berlin: Springer-Verlag, 2006, pp. 235 - 246.
-
-
-
-
6
-
-
33751113672
-
-
X. Huang, W. Susilo, Y. Mu and F. Zhang, Certificateless designated verifier signature schemes, in: Advances in AINA 2006, 2[C]. IEEE Computer, 2006, pp. 15 - 19.
-
X. Huang, W. Susilo, Y. Mu and F. Zhang, "Certificateless designated verifier signature schemes," in: Advances in AINA 2006, Vol 2[C]. IEEE Computer, 2006, pp. 15 - 19.
-
-
-
-
7
-
-
33846219987
-
Certificateless signature: A new security model and an improved generic construction
-
B. Hu, D. Wong, Z. Zhang and X. Deng, "Certificateless signature: a new security model and an improved generic construction" Designs, Codes and Cryptography, vol. 42, 2, 2007, pp. 109 - 126.
-
(2007)
Designs, Codes and Cryptography
, vol.42
, Issue.2
, pp. 109-126
-
-
Hu, B.1
Wong, D.2
Zhang, Z.3
Deng, X.4
-
8
-
-
63449122349
-
Digital signcryption or how to achieve cost(signature & encryption) < cost(signature) + cost(encryption)
-
Advances in CRYPTO 1997, Berlin: Springer-Verlag
-
Y. Zheng, "Digital signcryption or how to achieve cost(signature & encryption) < cost(signature) + cost(encryption)," in: Advances in CRYPTO 1997, Lecture Notes in Computer Science: Vol 1294, Berlin: Springer-Verlag, 1997, pp. 165 - 179.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
9
-
-
62449253208
-
-
J. Malone - Lee, Identity - based signcryption, Cryptol-ogy ePrint Archive, Report 2002/098, 2002. http://eprint.iacr.org/. unpublished.
-
J. Malone - Lee, "Identity - based signcryption," Cryptol-ogy ePrint Archive, Report 2002/098, 2002. http://eprint.iacr.org/. unpublished.
-
-
-
-
10
-
-
62449122501
-
New identity-based schemes from pairing
-
Full version available at
-
B. Libert and J. J. Quisquater, "New identity-based schemes from pairing," In IEEE Information Theory Work-shop 2003. Full version available at http://eprint.iacr.org/2003/023/. unpublished.
-
(2003)
IEEE Information Theory Work-shop
-
-
Libert, B.1
Quisquater, J.J.2
-
11
-
-
62449331335
-
-
Z. Cheng and R. Comley, Efficient Certificateless Public Key Encryption, Cryptology ePrint Archive, Report 2005/012. 2005. http://eprint.iacr.org/. unpublished.
-
Z. Cheng and R. Comley, "Efficient Certificateless Public Key Encryption," Cryptology ePrint Archive, Report 2005/012. 2005. http://eprint.iacr.org/. unpublished.
-
-
-
-
13
-
-
84957354154
-
Efficient and generalized group signatures
-
Advances in EUROCRYPT 1997, Berlin: Springer-Verlag
-
J. Camenisch, "Efficient and generalized group signatures," Advances in EUROCRYPT 1997, Lecture Notes in Computer Science: Vol 1233, Berlin: Springer-Verlag, 1997, pp. 465 - 479.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 465-479
-
-
Camenisch, J.1
-
14
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Advances in SAC 2002, Berlin: Springer-Verlag
-
F. Hess, "Efficient identity based signature schemes based on pairings," in: Advances in SAC 2002, Lecture Notes in Computer Science: Vol 2595, Berlin: Springer-Verlag, 2002, pp. 310 - 324.
-
(2002)
Lecture Notes in Computer Science
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
15
-
-
84927727752
-
Security proofs for signa-ture schemes
-
Advances in EUROCRYPT 1996, Berlin: Springer-Verlag
-
D. Pointcheval and J. Stern, "Security proofs for signa-ture schemes," in: Advances in EUROCRYPT 1996, Lecture Notes in Computer Science: Vol 1070, Berlin: Springer-Verlag, 1996, pp. 387 - 398.
-
(1996)
Lecture Notes in Computer Science
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
|