-
1
-
-
0345490607
-
Certificateless public key cryptography
-
ASIACRYPT
-
S.S. Al-Riyami, and K.G. Paterson Certificateless public key cryptography C.S. Laih, ASIACRYPT Lecture Notes in Computer Science vol. 2894 2003 Springer 452 473
-
(2003)
Lecture Notes in Computer Science
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
2
-
-
84876300178
-
Malicious kgc attacks in certificateless cryptography
-
ACM New York, NY, USA
-
M.H. Au, Y. Mu, J. Chen, D.S. Wong, J.K. Liu, and G. Yang Malicious kgc attacks in certificateless cryptography ASIACCS'07: Proceedings of the Second ACM Symposium on Information, Computer and Communications Security 2007 ACM New York, NY, USA 302 311
-
(2007)
ASIACCS'07: Proceedings of the Second ACM Symposium on Information, Computer and Communications Security
, pp. 302-311
-
-
Au, M.H.1
Mu, Y.2
Chen, J.3
Wong, D.S.4
Liu, J.K.5
Yang, G.6
-
3
-
-
33645958856
-
Certificateless public key encryption without pairing
-
ISC
-
J. Baek, R. Safavi-Naini, and W. Susilo Certificateless public key encryption without pairing J. Zhou, J. Lopez, R.H. Deng, F. Bao, ISC Lecture Notes in Computer Science vol. 3650 2005 Springer 134 148
-
(2005)
Lecture Notes in Computer Science
, vol.3650
, pp. 134-148
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
4
-
-
62449111027
-
Certificateless signcryption
-
M. Barbosa, and P. Farshim Certificateless signcryption M. Abe, V.D. Gligor, ASIACCS 2008 ACM 369 372
-
(2008)
ASIACCS
, pp. 369-372
-
-
Barbosa, M.1
Farshim, P.2
-
6
-
-
0031619016
-
The random oracle methodology, revisited (preliminary version)
-
R. Canetti, O. Goldreich, S. Halevi, The random oracle methodology, revisited (preliminary version), in: STOC, pp. 209-218.
-
STOC
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
7
-
-
4243180376
-
The random oracle methodology, revisited
-
R. Canetti, O. Goldreich, and S. Halevi The random oracle methodology, revisited J. ACM 51 2004 557 594
-
(2004)
J. ACM
, vol.51
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
8
-
-
67849099096
-
Certificateless threshold ring signature
-
S. Chang, D.S. Wong, Y. Mu, and Z. Zhang Certificateless threshold ring signature Inf. Sci. 179 2009 3685 3696
-
(2009)
Inf. Sci.
, vol.179
, pp. 3685-3696
-
-
Chang, S.1
Wong, D.S.2
Mu, Y.3
Zhang, Z.4
-
9
-
-
52149106246
-
General certificateless encryption and timed-release encryption
-
SCN
-
S.S.M. Chow, V. Roth, and E.G. Rieffel General certificateless encryption and timed-release encryption R. Ostrovsky, R.D. Prisco, I. Visconti, SCN Lecture Notes in Computer Science vol. 5229 2008 Springer 126 143
-
(2008)
Lecture Notes in Computer Science
, vol.5229
, pp. 126-143
-
-
Chow, S.S.M.1
Roth, V.2
Rieffel, E.G.3
-
10
-
-
40249085730
-
Certificateless encryption schemes strongly secure in the standard model
-
Public Key Cryptography
-
A.W. Dent, B. Libert, and K.G. Paterson Certificateless encryption schemes strongly secure in the standard model R. Ostrovsky, Public Key Cryptography Lecture Notes in Computer Science vol. 4939 2008 Springer 344 359
-
(2008)
Lecture Notes in Computer Science
, vol.4939
, pp. 344-359
-
-
Dent, A.W.1
Libert, B.2
Paterson, K.G.3
-
11
-
-
33846219987
-
Certificateless signature: A new security model and an improved generic construction
-
B.C. Hu, D.S. Wong, Z. Zhang, and X. Deng Certificateless signature: a new security model and an improved generic construction Des. Codes Cryptogr. 42 2007 109 126
-
(2007)
Des. Codes Cryptogr.
, vol.42
, pp. 109-126
-
-
Hu, B.C.1
Wong, D.S.2
Zhang, Z.3
Deng, X.4
-
12
-
-
38149074788
-
Generic certificateless encryption in the standard model
-
IWSEC
-
Q. Huang, and D.S. Wong Generic certificateless encryption in the standard model A. Miyaji, H. Kikuchi, K. Rannenberg, IWSEC Lecture Notes in Computer Science vol. 4752 2007 Springer 278 291
-
(2007)
Lecture Notes in Computer Science
, vol.4752
, pp. 278-291
-
-
Huang, Q.1
Wong, D.S.2
-
13
-
-
33744786523
-
On the security of certificateless signature schemes from asiacrypt
-
CANS
-
X. Huang, W. Susilo, Y. Mu, and F. Zhang On the security of certificateless signature schemes from asiacrypt Y. Desmedt, H. Wang, Y. Mu, Y. Li, CANS Lecture Notes in Computer Science vol. 3810 2005 Springer 13 25
-
(2005)
Lecture Notes in Computer Science
, vol.3810
, pp. 13-25
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
14
-
-
33745833916
-
On constructing certificateless cryptosystems from identity based encryption
-
Public Key Cryptography
-
B. Libert, and J.J. Quisquater On constructing certificateless cryptosystems from identity based encryption M. Yung, Y. Dodis, A. Kiayias, T. Malkin, Public Key Cryptography Lecture Notes in Computer Science vol. 3958 2006 Springer 474 490
-
(2006)
Lecture Notes in Computer Science
, vol.3958
, pp. 474-490
-
-
Libert, B.1
Quisquater, J.J.2
-
15
-
-
70449102675
-
Certificateless signcryption scheme in the standard model
-
Z. Liu, Y. Hu, X. Zhang, and H. Ma Certificateless signcryption scheme in the standard model Inf. Sci. 180 2010 452 464
-
(2010)
Inf. Sci.
, vol.180
, pp. 452-464
-
-
Liu, Z.1
Hu, Y.2
Zhang, X.3
Ma, H.4
-
16
-
-
56149108570
-
Breaking the short certificateless signature scheme
-
K.A. Shim Breaking the short certificateless signature scheme Inf. Sci. 179 2009 303 306
-
(2009)
Inf. Sci.
, vol.179
, pp. 303-306
-
-
Shim, K.A.1
-
17
-
-
35048832495
-
Generic construction of certificateless signature
-
ACISP
-
D.H. Yum, and P.J. Lee Generic construction of certificateless signature H. Wang, J. Pieprzyk, V. Varadharajan, ACISP Lecture Notes in Computer Science vol. 3108 2004 Springer 200 211
-
(2004)
Lecture Notes in Computer Science
, vol.3108
, pp. 200-211
-
-
Yum, D.H.1
Lee, P.J.2
-
18
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption) ≪ cost(signature) + cost(encryption)
-
Y. Zheng, Digital signcryption or how to achieve cost (signature & encryption) ≪ cost(signature) + cost(encryption), in: CRYPTO, pp. 165-179.
-
CRYPTO
, pp. 165-179
-
-
Zheng, Y.1
|