-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
35048854673
-
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
-
Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. Springer, Heidelberg
-
Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352-369. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2971
, pp. 352-369
-
-
Chow, S.S.M.1
Yiu, S.M.2
Hui, L.C.K.3
Chow, K.P.4
-
4
-
-
0031619016
-
The random oracle methodology, revisited (preliminary version)
-
Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited (preliminary version). In: Proceedings of the STOC 1998, Texas, USA, pp. 209-218 (1998)
-
(1998)
Proceedings of the STOC 1998, Texas, USA
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
5
-
-
35048841300
-
Efficient selective-id secure identity based encryption without random oracles
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient selective-id secure identity based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
6
-
-
35048835319
-
Secure identity based encryption without random oracles
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X.: Secure identity based encryption without random oracles. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 443-459. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
7
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
8
-
-
33947512019
-
Formal proofs for the security of signcryption
-
Baek, J., Steinfeld, R., Zheng, Y.: Formal proofs for the security of signcryption. Journal of Cryptology 20, 203-235 (2007)
-
(2007)
Journal of Cryptology
, vol.20
, pp. 203-235
-
-
Baek, J.1
Steinfeld, R.2
Zheng, Y.3
-
9
-
-
70349653943
-
Identity-based hybird signcryption
-
Li, F., Shirase, M., Takagi, T.: Identity-based hybird signcryption. In: ARES'09, pp. 534-539 (2009)
-
(2009)
ARES'09
, pp. 534-539
-
-
Li, F.1
Shirase, M.2
Takagi, T.3
-
10
-
-
33750052872
-
Efficient Signcryption Without Random Oracles
-
Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. Springer, Heidelberg
-
Wu, Q., Mu, Y., Susilo, W., Zhang, F.: Efficient Signcryption Without Random Oracles. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol. 4158, pp. 449-458. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4158
, pp. 449-458
-
-
Wu, Q.1
Mu, Y.2
Susilo, W.3
Zhang, F.4
-
11
-
-
54349101206
-
Identity based signcryption scheme without random oracles
-
Yu, Y., Yang, B., Sun, Y., Zhu, S.: Identity based signcryption scheme without random oracles. Computer Standards & Interfaces 31(1), 56-62 (2009)
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.1
, pp. 56-62
-
-
Yu, Y.1
Yang, B.2
Sun, Y.3
Zhu, S.4
-
12
-
-
70449102675
-
Certificateless signcryption scheme in the standard model
-
Liu, Z., Hu, Y., Zhang, X., Ma, H.: Certificateless signcryption scheme in the standard model. Information Sciences 180(3), 452-464 (2010)
-
(2010)
Information Sciences
, vol.180
, Issue.3
, pp. 452-464
-
-
Liu, Z.1
Hu, Y.2
Zhang, X.3
Ma, H.4
|