-
1
-
-
63449122349
-
Digital signcryption or how to achieve cost (Signature & encryption) cost(Signature) + cost(Encryption)
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Zheng, Y.L.: Digital signcryption or how to achieve cost (Signature & encryption) « cost(Signature) + cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165-179. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.L.1
-
2
-
-
84958948780
-
-
Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, 1431, pp. 55-59. Springer, Heidelberg (1998)
-
Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 55-59. Springer, Heidelberg (1998)
-
-
-
-
3
-
-
84949961454
-
New signcryption schemes based on KCDSA
-
Kim, K.-c, ed, ICISC 2001, Springer, Heidelberg
-
Yum, D.H., Lee, P.J.: New signcryption schemes based on KCDSA. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 533-547. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2288
, pp. 533-547
-
-
Yum, D.H.1
Lee, P.J.2
-
4
-
-
34347373013
-
-
Malone-Lee, J., Mao, W.: Two birds one stone: Signcryption using RSA. In: Joye, M. (ed.) CT-RSA 2003. LNCS, 2612, pp. 211-226. Springer, Heidelberg (2003)
-
Malone-Lee, J., Mao, W.: Two birds one stone: Signcryption using RSA. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 211-226. Springer, Heidelberg (2003)
-
-
-
-
5
-
-
37849005027
-
-
Chung, K.L., Yang, G.M., Wong, D.S., Deng, X.T., Chow, S.S.M.: An efficient signcryption scheme with key privacy. In: Lopez, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, 4582, pp. 78-93. Springer, Heidelberg (2007)
-
Chung, K.L., Yang, G.M., Wong, D.S., Deng, X.T., Chow, S.S.M.: An efficient signcryption scheme with key privacy. In: Lopez, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 78-93. Springer, Heidelberg (2007)
-
-
-
-
6
-
-
33947512019
-
Formal proofs for the security of signcryption
-
Joonsang, B., Ren, S., Zheng, Y.L.: Formal proofs for the security of signcryption. Journal of cryptology 20(1), 203-235 (2007)
-
(2007)
Journal of cryptology
, vol.20
, Issue.1
, pp. 203-235
-
-
Joonsang, B.1
Ren, S.2
Zheng, Y.L.3
-
7
-
-
24144498013
-
-
Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 362-379. Springer, Heidelberg (2005)
-
Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 362-379. Springer, Heidelberg (2005)
-
-
-
-
8
-
-
54349101206
-
Identity based signcryption scheme without random oracles
-
Yu, Y., Yang, B., Sun, Y., Zhu, S.L.: Identity based signcryption scheme without random oracles. Computer standard & interfaces 31(1), 56-62 (2009)
-
(2009)
Computer standard & interfaces
, vol.31
, Issue.1
, pp. 56-62
-
-
Yu, Y.1
Yang, B.2
Sun, Y.3
Zhu, S.L.4
-
9
-
-
33646820668
-
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515-532. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.-J.4
-
10
-
-
35048854673
-
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
-
Lim, J.-I, Lee, D.-H, eds, ICISC 2003, Springer, Heidelberg
-
Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352-369. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2971
, pp. 352-369
-
-
Chow, S.S.M.1
Yiu, S.M.2
Hui, L.C.K.3
Chow, K.P.4
-
11
-
-
33744527371
-
Analysis of improved signcryption scheme with key privacy
-
Tan, C.H.: Analysis of improved signcryption scheme with key privacy. Information Processing Letters 99(4), 135-138 (2006)
-
(2006)
Information Processing Letters
, vol.99
, Issue.4
, pp. 135-138
-
-
Tan, C.H.1
-
12
-
-
24144434019
-
-
Yuen, T.H., Wei, V.K.: Fast and proven secure blind identity-based signcryption from pairings. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, 3376, pp. 305-322. Springer, Heidelberg (2005)
-
Yuen, T.H., Wei, V.K.: Fast and proven secure blind identity-based signcryption from pairings. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 305-322. Springer, Heidelberg (2005)
-
-
-
-
13
-
-
33744502401
-
Identity-based ring signcryption scheme: Cryptographic primitives for preserving privacy and authenticity in the ubiquitious world
-
Huang, X.Y., Su, W., Yi, M.: Identity-based ring signcryption scheme: cryptographic primitives for preserving privacy and authenticity in the ubiquitious world. In: 19th International conference on Advance Information Networking and Applications, pp. 649-654 (2003)
-
(2003)
19th International conference on Advance Information Networking and Applications
, pp. 649-654
-
-
Huang, X.Y.1
Su, W.2
Yi, M.3
-
14
-
-
84946833891
-
How to leak a secret
-
Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552-565. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
15
-
-
45849094777
-
Efficient secret authenticatable anonymous signcryption scheme with identity privacy
-
Yang, C.C, Chen, H, Chau, M, Chang, K, Lang, S.-D, Chen, P.S, Hsieh, R, Zeng, D, Wang, F.-Y, Carley, K.M, Mao, W, Zhan, J, eds, ISI Workshops 2008, Springer, Heidelberg
-
Zhang, M.W., Yang, B., Zhu, S., Zhang, W.Z.: Efficient secret authenticatable anonymous signcryption scheme with identity privacy. In: Yang, C.C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P.S., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K.M., Mao, W., Zhan, J. (eds.) ISI Workshops 2008. LNCS, vol. 5075, pp. 126-137. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5075
, pp. 126-137
-
-
Zhang, M.W.1
Yang, B.2
Zhu, S.3
Zhang, W.Z.4
-
16
-
-
67649983782
-
A Novel ID-Based Anonymous Signcryption Scheme
-
Li, Q, et al, eds, APWeb/WAIM 2009, Springer, Heidelberg
-
Zhang, J.H., Gao, S.N., Chen, H., Geng, Q.: A Novel ID-Based Anonymous Signcryption Scheme. In: Li, Q., et al. (eds.) APWeb/WAIM 2009. LNCS, vol. 5446, pp. 604-610. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5446
, pp. 604-610
-
-
Zhang, J.H.1
Gao, S.N.2
Chen, H.3
Geng, Q.4
|