-
1
-
-
54349101206
-
Identity based signcryption scheme without random oracles
-
Y.Yu, B.Yang, Y. Sun, S.Zhou, Identity based signcryption scheme without random oracles [J]. Computer Standards & Interfaces. 2009, 31:56-62
-
(2009)
Computer Standards & Interfaces
, vol.31
, pp. 56-62
-
-
Yu, Y.1
Yang, B.2
Sun, Y.3
Zhou, S.4
-
2
-
-
0001827537
-
Identity-based cryptosystem and signature scheme
-
Lecture Notes in Computer Science
-
A. Shamir, Identity-based cryptosystem and signature scheme [C]. In Proceedings of Cryptography-CRYPTO 1984, 1985, Lecture Notes in Computer Science 196:120-126
-
(1985)
Proceedings of Cryptography-CRYPTO 1984
, vol.196
, pp. 120-126
-
-
Shamir, A.1
-
3
-
-
84874324906
-
Identity-based encryption from the Weil pairings
-
Lecture Notes in Computer Science
-
D. Boneh, M. Franklin, Identity-based encryption from the Weil pairings [C]. In Proceedings of Cryptology-CRYPTO 2001, 2001, Lecture Notes in Computer Science 2139:213-229
-
(2001)
Proceedings of Cryptology-CRYPTO 2001
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Lecture Notes in Computer Science
-
F. Hess, Efficient identity based signature schemes based on pairings [C]. In Proceedings of SAC 2002, 2002, Lecture Notes in Computer Science 2595:310-324
-
(2002)
Proceedings of SAC 2002
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
5
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
Lecture Notes in Computer Science
-
J.C. Cha, J.H. Cheon, An identity-based signature from gap Diffie-Hellman groups [C]. In Proceedings of PKC 2003, 2003, Lecture Notes in Computer Science 2567:18-30
-
(2003)
Proceedings of PKC 2003
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
6
-
-
24944566040
-
Efficient identity based encryption without random oracles
-
Lecture Notes in Computer Science
-
R. Waters, Efficient identity based encryption without random oracles [C]. In Proceedings of Eurocrypt 2005, 2005, Lecture Notes in Computer Science 3494:114-127
-
(2005)
Proceedings of Eurocrypt 2005
, vol.3494
, pp. 114-127
-
-
Waters, R.1
-
7
-
-
33746372179
-
Efficient identity based signatures secure in the standard model
-
Lecture Notes in Computer Science
-
K.G. Paterson, J.C.N. Schuldt, Efficient identity based signatures secure in the standard model [C]. In Proceedings of Information Security and Privacy-ACISP 2006, 2006, Lecture Notes in Computer Science 4058: 207-222
-
(2006)
Proceedings of Information Security and Privacy-ACISP 2006
, vol.4058
, pp. 207-222
-
-
Paterson, K.G.1
Schuldt, J.C.N.2
-
8
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature)+cost (encryption)
-
Lecture Notes in Computer Science
-
Y. Zheng, Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature)+cost (encryption) [C]. In Proceedings of Cryptography-CRYPTO 1997, 1997, Lecture Notes in Computer Science 1294:165-179.
-
(1997)
Proceedings of Cryptography-CRYPTO 1997
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
10
-
-
84939205648
-
A new identity based signcryption scheme from pairings
-
B. Libert, J.J. Quisquator, A new identity based signcryption scheme from pairings [C]. In Proceedings of IW 2003, pp:155-158
-
(2003)
Proceedings of IW
, pp. 155-158
-
-
Libert, B.1
Quisquator, J.J.2
-
11
-
-
35048854673
-
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
-
Lecture Notes in Computer Science
-
S.S.M. Chow, S.M. Yiu, L.C.K. Hui, K.P. Chow, Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity [C]. In Proceedings of Information Security and Cryptology-ICISC 2003, 2004, Lecture Notes in Computer Science 2971: 352-369
-
(2004)
Proceedings of Information Security and Cryptology-ICISC 2003
, vol.2971
, pp. 352-369
-
-
Chow, S.S.M.1
Yiu, S.M.2
Hui, L.C.K.3
Chow, K.P.4
-
12
-
-
35248874429
-
Multipurpose identity based signcryption: a Swiss army knife for identity based cryptography
-
Lecture Notes in Computer Science
-
X. Boyen, Multipurpose identity based signcryption: a Swiss army knife for identity based cryptography [C]. In Proceedings of Cryptology-CRYPTO 2003, 2003, Lecture Notes in Computer Science 2792:383-399
-
(2003)
Proceedings of Cryptology-CRYPTO 2003
, vol.2792
, pp. 383-399
-
-
Boyen, X.1
-
13
-
-
24144498013
-
Improved identity-based signcryption
-
Lecture Notes in Computer Science
-
L. Chen, J. Malone-Lee, Improved identity-based signcryption [C]. In Proceedings of PKC 2005, 2005, Lecture Notes in Computer Science 3386:362-379
-
(2005)
Proceedings of PKC 2005
, vol.3386
, pp. 362-379
-
-
Chen, L.1
Malone-Lee, J.2
-
14
-
-
33646820668
-
Efficient and provably-secure identity based signatures and signcryption from bilinear maps
-
Lecture Notes in Computer Science
-
P.S.L.M. Barreto, B. Libert, N. McCullagh, J.J. Quisquater, Efficient and provably-secure identity based signatures and signcryption from bilinear maps [C]. In Proceedings of Cryptology-ASIACRYPT 2005, 2005, Lecture Notes in Computer Science 3788:515-532
-
(2005)
Proceedings of Cryptology-ASIACRYPT 2005
, vol.3788
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.J.4
-
15
-
-
33745855807
-
Strongly unforgeable signatures based on computational Diffie-Hellman
-
Lecture Notes in Computer Science
-
D.Boneh, E. Shen, and B.Waters, Strongly unforgeable signatures based on computational Diffie-Hellman [C]. In Proceedings of PKC 2005, 2005, Lecture Notes in Computer Science 3958:229-240
-
(2005)
Proceedings of PKC 2005
, vol.3958
, pp. 229-240
-
-
Boneh, D.1
Shen, E.2
Waters, B.3
|