-
1
-
-
84876300178
-
Malicious KGC attacks in certificateless cryptography
-
Au MH, Chen J, Liu JK, Mu Y, Wong DS, Yang G (2007) Malicious KGC attacks in certificateless cryptography. In: Proceedings of ASIACCS'07, pp 302-311
-
(2007)
Proceedings of ASIACCS'07
, pp. 302-311
-
-
Au, M.H.1
Chen, J.2
Liu, J.K.3
Mu, Y.4
Wong, D.S.5
Yang, G.6
-
2
-
-
0345490607
-
Certificateless public key cryptography
-
Lecture notes in computer science Springer Berlin
-
Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: Advances in cryptology-ASISCRYPT'03. Lecture notes in computer science, vol 2894. Springer, Berlin, pp 452-473
-
(2003)
Advances in cryptology-ASISCRYPT'03
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
3
-
-
84937428623
-
Efficient algorithm for pairing-based cryptosystems
-
Lecture notes in computer science Springer Berlin
-
Barreto PSLM, Kim HY, Lynn B, Scott M (2002) Efficient algorithm for pairing-based cryptosystems. In: Advances in cryptology-CRYPTO'02. Lecture notes in computer science, vol 2442. Springer, Berlin, pp 354-369
-
(2002)
Advances in cryptology-CRYPTO'02
, vol.2442
, pp. 354-369
-
-
Pslm, B.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
4
-
-
35048900981
-
On the selection of pairing-friendly groups
-
Lecture notes in computer science Springer Berlin
-
Barreto PSLM, Lynn B, Scott M (2003) On the selection of pairing-friendly groups. In: Proceedings of SAC'03. Lecture notes in computer science, vol 3006. Springer, Berlin, pp 17-25
-
(2003)
Proceedings of SAC'03
, vol.3006
, pp. 17-25
-
-
Pslm, B.1
Lynn, B.2
Scott, M.3
-
6
-
-
35048881545
-
The knowledge-of-exponent assumptions and 3-round zero-knowledge protocols
-
Lecture notes in computer science Springer Berlin
-
Bellare M, Palacio A (2004) The knowledge-of-exponent assumptions and 3-round zero-knowledge protocols. In: Advances in cryptology-CRYPTO'04. Lecture notes in computer science, vol 3152. Springer, Berlin, pp 273-289
-
(2004)
Advances in cryptology-CRYPTO'04
, vol.3152
, pp. 273-289
-
-
Bellare, M.1
Palacio, A.2
-
7
-
-
35048848152
-
Short signatures without rando oracles
-
Lecture notes in computer science Springer Berlin
-
Boneh D, Boyen X (2004) Short signatures without rando oracles. In: Advances in cryptology-EUROCRYPT'04. Lecture notes in computer science, vol 3027. Springer, Berlin, pp 56-73
-
(2004)
Advances in cryptology-EUROCRYPT'04
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
8
-
-
84946840347
-
Short signatures from the weil pairing
-
Lecture notes in computer science Springer Berlin
-
Boneh D, Lynn B, Shacham H (2001) Short signatures from the weil pairing. In: Advances in cryptology-ASIACRYPT'01. Lecture notes in computer science, vol 2248. Springer, Berlin, pp 514-533
-
(2001)
Advances in cryptology-ASIACRYPT'01
, vol.2248
, pp. 514-533
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
9
-
-
38049004985
-
Efficient certificateless signature schemes
-
Lecture notes in computer science Springer Berlin
-
Choi KY, Park JH, Hwang JY, Lee DH (2007) Efficient certificateless signature schemes. In: Proceedings of ACNS'07. Lecture notes in computer science, vol 4521. Springer, Berlin, pp 443-458
-
(2007)
Proceedings of ACNS'07
, vol.4521
, pp. 443-458
-
-
Choi, K.Y.1
Park, J.H.2
Hwang, J.Y.3
Lee, D.H.4
-
10
-
-
85029541173
-
Towards practical public key systems secure against chosen ciphertext attacks
-
Lecture notes in computer science Springer Berlin
-
Damgård I (1992) Towards practical public key systems secure against chosen ciphertext attacks. In: Advances in cryptology-CRYPTO'91. Lecture notes in computer science, vol 576. Springer, Berlin, pp 445-456
-
(1992)
Advances in cryptology-CRYPTO'91
, vol.576
, pp. 445-456
-
-
Damgård, I.1
-
11
-
-
55749090987
-
Efficient and provably-secure certificateless short signature scheme from bilinear pairings
-
H Du Q Wen 2009 Efficient and provably-secure certificateless short signature scheme from bilinear pairings Int J Comput Stand Interfaces 31 390 394
-
(2009)
Int J Comput Stand Interfaces
, vol.31
, pp. 390-394
-
-
Du, H.1
Wen, Q.2
-
12
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
935341
-
S Goldwasser S Micali RL Rivest 1988 A digital signature scheme secure against adaptive chosen-message attacks SIAM J Comput 17 2 281 308 935341
-
(1988)
SIAM J Comput
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
13
-
-
33646852592
-
An efficient certificateless signature scheme
-
DOI 10.1007/11596981-16, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings
-
Gorantla MC, Saxena A (2005) An efficient certificateless signature scheme. In: Proceedings of CIS'05. Lecture notes in artificial intelligence, vol 3802(II). Springer, Berlin, pp 110-116 (Pubitemid 43775235)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3802
, pp. 110-116
-
-
Gorantla, M.C.1
Saxena, A.2
-
14
-
-
84927764036
-
On the Existence of 3-Round Zero-Knowledge Protocols
-
Advances in Cryptology - CRYPTO '98
-
Hada S, Tanaka T (1998) On the existence of 3-round zero-knowledge protocols. In: Advances in cryptology-CRYPTO'98. Lecture notes in computer science, vol 1462. Springer, Berlin, pp 408-423 (Pubitemid 128119021)
-
(1998)
Lecture Notes in Computer Science
, Issue.1462
, pp. 408-423
-
-
Hada, S.1
Tanaka, T.2
-
15
-
-
33846219987
-
Certificateless signature: A new security model and an improved generic construction
-
DOI 10.1007/s10623-006-9022-9
-
BC Hu DS Wong Z Zhang X Deng 2007 Certificatelss signature: a new security model and an improved generic construction Designs Codes Cryptography 42 2 109 126 2287186 (Pubitemid 46094766)
-
(2007)
Designs, Codes, and Cryptography
, vol.42
, Issue.2
, pp. 109-126
-
-
Hu, B.C.1
Wong, D.S.2
Zhang, Z.3
Deng, X.4
-
16
-
-
38149080541
-
Certificateless signature revisted
-
Lecture notes in computer science Springer Berlin
-
Huang X, Mu Y, Susilo W, Wong DS, Wu W (2007) Certificateless signature revisted. In: Proceedings of ACISP'07. Lecture notes in computer science, vol 4586. Springer, Berlin, pp 308-322
-
(2007)
Proceedings of ACISP'07
, vol.4586
, pp. 308-322
-
-
Huang, X.1
Mu, Y.2
Susilo, W.3
Wong, D.S.4
Wu, W.5
-
17
-
-
33744786523
-
On the security of certificateless signature schemes from Asiacrypt 2003
-
Cryptology and Network Security - 4th International Conference, CANS 2005, Proceedings
-
Huang X, Susilo W, Mu Y, Zhang F (2005) On the security of certificateless signature schemes from Asiacrypt 2003. In: Proceedings of CANS'05. Lecture notes in computer science, vol 3810. Springer, Berlin, pp 13-25 (Pubitemid 43829589)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3810
, pp. 13-25
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
18
-
-
84876341103
-
Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model
-
Liu JK, Au MH, Susilo W (2007) Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: Proceedings of ASIACCS'07, pp 273-283
-
(2007)
Proceedings of ASIACCS'07
, pp. 273-283
-
-
Liu, J.K.1
Au, M.H.2
Susilo, W.3
-
20
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Lecture notes in computer science Springer Berlin
-
Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Advances in cryptology-CRYPTO'84. Lecture notes in computer science, vol 0196. Springer, Berlin, pp 47-53
-
(1984)
Advances in cryptology-CRYPTO'84
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
21
-
-
18844409796
-
New traitor tracing schemes using bilinear map
-
Tô V, Safavi-Naini R, Zhang F (2003) New traitor tracing schemes using bilinear map. In: Proceedings of 2003 DRM workshop, pp 67-76
-
(2003)
Proceedings of 2003 DRM Workshop
, pp. 67-76
-
-
Tô, V.S.1
-
24
-
-
33749421203
-
An efficient certificteless signature
-
Lecture notes in computer science Springer Berlin
-
Yap WL, Heng SH, Goi BM (2006) An efficient certificteless signature. In: Proceedings of EUC workshops'06. Lecture notes in computer science, vol 4097. Springer, Berlin, pp 322-331
-
(2006)
Proceedings of EUC workshops'06
, vol.4097
, pp. 322-331
-
-
Yap, W.L.1
Heng, S.H.2
Goi, B.M.3
-
25
-
-
38049048378
-
Security mediated certificateless signatures
-
Lecture notes in computer science Springer Berlin
-
Yap WL, Chow SSM, Heng SH, Goi BM (2007) Security mediated certificateless signatures. In: Proceedings of ACNS'07. Lecture notes in computer science, vol 4521. Springer, Berlin, pp 459-477
-
(2007)
Proceedings of ACNS'07
, vol.4521
, pp. 459-477
-
-
Yap, W.L.1
Chow, S.S.M.2
Heng, S.H.3
Goi, B.M.4
-
26
-
-
35048832495
-
Generic construction of certificateless signature
-
Lecture note in computer science Springer Berlin
-
Yum DH, Lee PJ (2004) Generic construction of certificateless signature. In: Proceedings of ACISP'04. Lecture note in computer science, vol 3108. Springer, Berlin, pp 200-211
-
(2004)
Proceedings of ACISP'04
, vol.3108
, pp. 200-211
-
-
Yum, D.H.1
Lee, P.J.2
-
27
-
-
77951143073
-
A new short signature scheme without random oracles from bilinear pairings
-
Available at
-
Zhang F, Chen X, Susilo W, Mu Y (2005) A new short signature scheme without random oracles from bilinear pairings. Cryptology ePrint Archive, Repost 2005/386. Available at http://eprint.iacr.org/2005/386.pdf
-
(2005)
Cryptology EPrint Archive, Repost 2005/386
-
-
Zhang, F.1
Chen, X.2
Susilo, W.3
Mu, Y.4
-
28
-
-
35048854587
-
An efficient signature scheme from binilear pairings and its applications
-
Lecture notes in computer science Springer Berlin
-
Zhang F, Safavi-Naini R, Susilo W (2003) An efficient signature scheme from binilear pairings and its applications. In: Proceedings of PKC'04. Lecture notes in computer science, vol 3947. Springer, Berlin, pp 277-290
-
(2003)
Proceedings of PKC'04
, vol.3947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
-
29
-
-
33746591632
-
Certificateless public-key signature: Security model and efficient construction
-
Applied Cryptography and Network Security - 4th International Conference, ACNS 2006, Proceedings
-
Zhang Z, Wong DS, Xu J, Feng D (2006) Certificateless public-key signature: security model and efficient construction. In: Proceedings of ACNS'06. Lecture notes in computer science, vol 3989. Springer, Berlin, pp 293-308 (Pubitemid 44152825)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3989
, pp. 293-308
-
-
Zhang, Z.1
Wong, D.S.2
Xu, J.3
Feng, D.4
-
30
-
-
38149132343
-
New efficient certificateless signature scheme
-
Lecture notes in computer science Springer Berlin
-
Zheng L, Zhang F, Zhang F (2007) New efficient certificateless signature scheme. In: Proceedings of EUC'07. Lecture notes in computer science, vol 4809. Springer, Berlin, pp 692-703
-
(2007)
Proceedings of EUC'07
, vol.4809
, pp. 692-703
-
-
Zheng, L.1
Zhang, F.2
Zhang, F.3
|