-
1
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption << cost (signature) + cost (encryption)
-
Y. Zheng, "Digital signcryption or how to achieve cost (signature & encryption << cost (signature) + cost (encryption)", Advances in Cryptology-CRYPTO'97, LNCS 1294, pp.165-179, 1997.
-
(1997)
Advances In Cryptology-CRYPTO'97, LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
2
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, "Identity-based cryptosystems and signature schemes", Advances in Cryptology-CRYPTO'84, LNCS 196, pp.47-53, 1984.
-
(1984)
Advances In Cryptology-CRYPTO'84, LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
5
-
-
78651536235
-
-
In 2003 Symposium on Cryptography and Information Security - SCIS'2003, Hamamatsu, Japan
-
R. Sakai and M. Kasahara, "Id-based cryptosystems with pairing on elliptic curve", In 2003 Symposium on Cryptography and Information Security - SCIS'2003, Hamamatsu, Japan, 2003. See also http://eprint.iacr.org/2003/054.
-
(2003)
Id-based Cryptosystems With Pairing On Elliptic Curve
-
-
Sakai, R.1
Kasahara, M.2
-
6
-
-
35248874429
-
Multipurpose identity-based signcryption: A Swiss army knife for identity-based cryptography
-
X. Boyen, "Multipurpose identity-based signcryption: A Swiss army knife for identity-based cryptography", Advances in Cryptology-CRYPTO 2003, LNCS 2729, pp.383-399, 2003.
-
(2003)
Advances In Cryptology-CRYPTO 2003, LNCS
, vol.2729
, pp. 383-399
-
-
Boyen, X.1
-
8
-
-
35048854673
-
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity
-
In Proceeding of Information Security and Cryptology - ICISC 2003
-
Sherman S.M. Chow, S.M. Yiu, Lucas C.K. Hui, et al, "Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity", In Proceeding of Information Security and Cryptology - ICISC 2003, LNCS 2971,pp.352-369,2004.
-
(2004)
LNCS
, vol.2971
, pp. 352-369
-
-
Sherman, C.S.M.1
Yiu, S.M.2
Lucas, H.C.K.3
-
9
-
-
33645964923
-
Analysis and Improvement of a Signcryption Scheme with Key Privacy
-
In Proceeding of PKC'04
-
Y. Cuomin, S. Wong and X. Deng, "Analysis and Improvement of a Signcryption Scheme with Key Privacy", In Proceeding of PKC'04, LNCS 3650, pp.218-232, 2005.
-
(2005)
LNCS
, vol.3650
, pp. 218-232
-
-
Cuomin, Y.1
Wong, S.2
Deng, X.3
-
10
-
-
33749410609
-
An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings
-
In Proceeding of EUC Workshops 2006
-
H. Chen, Z. H. Li and Q. Chen, "An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings", In Proceeding of EUC Workshops 2006, LNCS 4097,pp.342-351,2006.
-
(2006)
LNCS
, vol.4097
, pp. 342-351
-
-
Chen, H.1
Li, Z.H.2
Chen, Q.3
-
11
-
-
84867515151
-
Signcryption in hierarchical identity based cryptosystem
-
In Proceeding of the 20th International Conference on Information Security (SEC'05)
-
S. S.M. Chow, T. H. Yuen, L. C. K. Hui, et al, "Signcryption in hierarchical identity based cryptosystem" In Proceeding of the 20th International Conference on Information Security (SEC'05). IFIP TC11, pp. 443-457, 2005.
-
(2005)
IFIP TC11
, pp. 443-457
-
-
Chow, S.S.M.1
Yuen, T.H.2
Hui, L.C.K.3
-
13
-
-
84937389342
-
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
-
In Proceeding of PKC'01
-
T. Okamoto, D. Pointcheval, "The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes", In Proceeding of PKC'01, LNCS 1992, pp.104-118, 2001.
-
(2001)
LNCS
, vol.1992
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
14
-
-
35048835319
-
Secure identity based encryption without random oracles
-
In Proceeding of Advances in Cryptology - CRYPTO 2004
-
D. Boneh and X. Boyen, "Secure identity based encryption without random oracles", In Proceeding of Advances in Cryptology - CRYPTO 2004, LNCS 3152, pp.443-459,2004.
-
(2004)
LNCS
, vol.3152
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
15
-
-
33750052872
-
Efficient Signcryption Without Random Oracles
-
In Proceeding of ATC'2006
-
Q. H. Wu, Y. Mu, W. Susilo, et al. "Efficient Signcryption Without Random Oracles", In Proceeding of ATC'2006, LNCS 4158, pp.449-458,2006.
-
(2006)
LNCS
, vol.4158
, pp. 449-458
-
-
Wu, Q.H.1
Mu, Y.2
Susilo, W.3
-
16
-
-
0242445175
-
-
Cryptology ePrint Archive, Report 2002/098
-
J. Malone-Lee, "Identity-based signcryption" Cryptology ePrint Archive, Report 2002/098, 2002. http://eprint.iacr.org/.
-
(2002)
Identity-based Signcryption
-
-
Malone-Lee, J.1
-
19
-
-
0000901529
-
Security Arguments for Digital Signatures and Blind Signatures
-
D. Pointcheval and J. Stern, "Security Arguments for Digital Signatures and Blind Signatures", Journal of Cryptology, vol.13, no. 3, pp.361-396, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
|