-
1
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption) << cost(signature)+cost(encryption)
-
Springer, Heidelberg
-
Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) << cost(signature)+cost(encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165-179. Springer, Heidelberg (1997)
-
(1997)
Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
2
-
-
50249109606
-
A certificateless signature and group signature schemes against malicious PKG
-
Zhang, G., Wang, S.: A Certificateless Signature and Group Signature Schemes against Malicious PKG. In: AINA 2008, pp. 334-341 (2008)
-
(2008)
AINA 2008
, pp. 334-341
-
-
Zhang, G.1
Wang, S.2
-
3
-
-
33744502401
-
Identity-based ring signcryption scheme: Cryptographic primitives for preserving privacy and authenticity in the ubiquitious world
-
Springer, Heidelberg
-
Huang, X.Y., Su, W., Mu, Y.: Identity-based ring signcryption scheme: cryptographic primitives for preserving privacy and authenticity in the ubiquitious world. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 649-654. Springer, Heidelberg (2003)
-
(2003)
Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS
, vol.2727
, pp. 649-654
-
-
Huang, X.Y.1
Su, W.2
Mu, Y.3
-
4
-
-
45849094777
-
Efficient secret authenticatable anonymous signcryption scheme with identity privacy
-
Springer, Heidelberg
-
Zhang, M., Yang, B., Chen, Y., Zhang, W.: Efficient secret authenticatable anonymous signcryption scheme with identity privacy. In: Yang, C.C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P.S., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K.M., Mao, W., Zhan, J. (eds.) ISI Workshops 2008. LNCS, vol. 5075, pp. 126-137. Springer, Heidelberg (2008)
-
(2008)
Yang, C.C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P.S., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K.M., Mao, W., Zhan, J. (eds.) ISI Workshops 2008. LNCS
, vol.5075
, pp. 126-137
-
-
Zhang, M.1
Yang, B.2
Chen, Y.3
Zhang, W.4
-
5
-
-
84958982846
-
Formal proofs for the security of signcryption
-
Springer, Heidelberg
-
Baek, J., Steinfeld, R., Zheng, Y.: Formal proofs for the security of signcryption. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 80-98. Springer, Heidelberg (2002)
-
(2002)
Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS
, vol.2274
, pp. 80-98
-
-
Baek, J.1
Steinfeld, R.2
Zheng, Y.3
-
6
-
-
35248874429
-
Multiprupose identity-based signcryption: A Swiss ary knife for identity-based cryptology
-
Springer, Heidelberg
-
Boyen, X.: Multiprupose identity-based signcryption: A Swiss ary knife for identity-based cryptology. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 383-399. Springer, Heidelberg (2003)
-
(2003)
Boneh, D. (ed.) CRYPTO 2003. LNCS
, vol.2729
, pp. 383-399
-
-
Boyen, X.1
-
7
-
-
35048859269
-
Efficient signcryption with key privacy from gap diffie-hellman groups
-
Springer, Heidelberg
-
Libert, B., Quisquater, J.: Efficient signcryption with key privacy from gap diffie-hellman groups. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 187-200. Springer, Heidelberg (2004)
-
(2004)
Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS
, vol.2947
, pp. 187-200
-
-
Libert, B.1
Quisquater, J.2
-
8
-
-
24144493758
-
On the signcryption scheme with key privacy
-
Tan, C.-H.: On the signcryption Scheme with key privacy. IEICE Trans. Fundamentals E88-A, 1093-1095
-
IEICE Trans. Fundamentals E88-A
, pp. 1093-1095
-
-
Tan, C.-H.1
-
10
-
-
35048854673
-
Efficient forward and provably secure ID-based signcryption Scheme with public verifiability and public ciphertext authenticity
-
Springer, Heidelberg
-
Chow, S.M., Yiu, S.M., Hui, L., Chow, K.: Efficient forward and provably secure ID-based signcryption Scheme with public verifiability and public ciphertext authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352-369. Springer, Heidelberg (2004)
-
(2004)
Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS
, vol.2971
, pp. 352-369
-
-
Chow, S.M.1
Yiu, S.M.2
Hui, L.3
Chow, K.4
-
11
-
-
33746324583
-
Efficient and provably secure multi-receiver identity-based sign-cryption
-
Springer, Heidelberg
-
Duan, S., Cao, Z.: Efficient and provably secure multi-receiver identity-based sign-cryption. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 195-206. Springer, Heidelberg (2006)
-
(2006)
Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS
, vol.4058
, pp. 195-206
-
-
Duan, S.1
Cao, Z.2
-
12
-
-
33845933978
-
Efficient short signcryption scheme with public verifiability
-
Springer, Heidelberg
-
Ma, C.: Efficient short signcryption scheme with public verifiability. In: Lipmaa, H., Yung, M., Lin, D. (eds.) Inscrypt 2006. LNCS, vol. 4318, pp. 118-129. Springer, Heidelberg (2006)
-
(2006)
Lipmaa, H., Yung, M., Lin, D. (eds.) Inscrypt 2006. LNCS
, vol.4318
, pp. 118-129
-
-
Ma, C.1
-
13
-
-
33646820668
-
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
-
Springer, Heidelberg
-
Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515-532. Springer, Heidelberg (2005)
-
(2005)
Roy, B. (ed.) ASIACRYPT 2005. LNCS
, vol.3788
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.-J.4
|