-
1
-
-
63449122349
-
Digital Signcryption or How to Achieve Cost (Signature & Encryption) " Cost (Signature) + Cost (Encryption)
-
Advances in Cryptology - CRYPTO '97
-
Y. Zheng Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) cost (encryption) Advances in Cryptology CRYPTO'97 LNCS vol. 1294 1997 Springer-Verlag 165 179 (Pubitemid 127112551)
-
(1997)
Lecture Notes in Computer Science
, Issue.1294
, pp. 165-179
-
-
Zheng, Y.1
-
2
-
-
33947512019
-
Formal proofs for the security of signcryption
-
DOI 10.1007/s00145-007-0211-0
-
J. Baek, R. Steinfeld, and Y. Zheng Formal proofs for the security of signcryption Journal of Cryptology 20 2 2007 203 235 (Pubitemid 46473855)
-
(2007)
Journal of Cryptology
, vol.20
, Issue.2
, pp. 203-235
-
-
Baek, J.1
Steinfeld, R.2
Zheng, Y.3
-
3
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
CRYPTO'84 LNCS Springer-Verlag
-
A. Shamir Identity-based cryptosystems and signature schemes Advances in Cryptology CRYPTO'84 LNCS vol. 196 1984 Springer-Verlag 47 53
-
(1984)
Advances in Cryptology
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
4
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh, and M. Franklin Identity-based encryption from the weil pairing Advances in Cryptology CRYPTO 2001 LNCS vol. 2139 2001 Springer-Verlag 213 229 (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
84939205648
-
A new identity based signcryption schemes from pairings
-
Paris, France
-
B. Libert, J.J. Quisquater, A new identity based signcryption schemes from pairings, in: 2003 IEEE Information Theory Workshop, Paris, France, 2003, pp. 155158.
-
(2003)
2003 IEEE Information Theory Workshop
, pp. 155158
-
-
Libert, B.1
Quisquater, J.J.2
-
6
-
-
35048854673
-
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
-
ICISC 2003 LNCS Springer-Verlag
-
S.S.M. Chow, S.M. Yiu, L.C.K. Hui, and K.P. Chow Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity Information Security and Cryptology ICISC 2003 LNCS vol. 2971 2004 Springer-Verlag 352 369
-
(2004)
Information Security and Cryptology
, vol.2971
, pp. 352-369
-
-
Chow, S.S.M.1
Yiu, S.M.2
Hui, L.C.K.3
Chow, K.P.4
-
7
-
-
24144498013
-
Improved identity-based signcryption
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
L. Chen, and J. Malone-Lee Improved identity-based signcryption Public Key Cryptography PKC 2005 LNCS vol. 3386 2005 Springer-Verlag 362 379 (Pubitemid 41231343)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 362-379
-
-
Chen, L.1
Malone-Lee, J.2
-
8
-
-
33646820668
-
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
-
DOI 10.1007/11593447-28, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
P.S.L.M. Barreto, B. Libert, N. McCullagh, and J.J. Quisquater Efficient and provably-secure identity-based signatures and signcryption from bilinear maps Advances in Cryptology ASIACRYPT 2005 LNCS vol. 3788 2005 Springer-Verlag 515 532 (Pubitemid 43763493)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3788 LNCS
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.-J.4
-
9
-
-
24944554962
-
Fuzzy identity-based encryption
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
A. Sahai, and B. Waters Fuzzy identity-based encryption Advances in Cryptology EUROCRYPT 2005 LNCS vol. 3494 2005 Springer-Verlag 457 473 (Pubitemid 41313969)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
10
-
-
34547325357
-
Secure attribute-based systems
-
Alexandria, USA
-
M. Pirretti, P. Traynor, P. McDaniel, B. Waters, Secure attribute-based systems, in: 2006 ACM Conference on Computer and Communications Security, Alexandria, USA, 2006, pp. 99112.
-
(2006)
2006 ACM Conference on Computer and Communications Security
, pp. 99112
-
-
Pirretti, M.1
Traynor, P.2
McDaniel, P.3
Waters, B.4
-
11
-
-
34748851940
-
New constructions of fuzzy identity-based encryption
-
Singapore
-
J. Baek, W. Susilo, J. Zhou, New constructions of fuzzy identity-based encryption, in: 2007 ACM Symposium on Information, Computer and Communications Security, Singapore, 2007, pp. 368370.
-
(2007)
2007 ACM Symposium on Information, Computer and Communications Security
, pp. 368370
-
-
Baek, J.1
Susilo, W.2
Zhou, J.3
-
13
-
-
33645585449
-
ID based cryptosystems with pairing on elliptic curve
-
R. Sakai, M. Kasahara, ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive, Report 2003/054, 2003.
-
(2003)
Cryptology EPrint Archive, Report
, vol.2003
, Issue.54
-
-
Sakai, R.1
Kasahara, M.2
-
15
-
-
78650367016
-
Generic constructions of biometric identity based encryption systems
-
WISTP 2010 LNCS Springer-Verlag
-
N.D. Sarier Generic constructions of biometric identity based encryption systems Information Security Theory and Practices WISTP 2010 LNCS vol. 6033 2010 Springer-Verlag 90 105
-
(2010)
Information Security Theory and Practices
, vol.6033
, pp. 90-105
-
-
Sarier, N.D.1
-
16
-
-
38149029815
-
A biometric identity based signature scheme
-
A. Burnett, F. Byrne, T. Dowling, and A. Duffy A biometric identity based signature scheme International Journal of Network Security 5 3 2007 317 326
-
(2007)
International Journal of Network Security
, vol.5
, Issue.3
, pp. 317-326
-
-
Burnett, A.1
Byrne, F.2
Dowling, T.3
Duffy, A.4
-
17
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
EUROCRYPT 2004 LNCS Springer-Verlag
-
Y. Dodis, L. Reyzin, and A. Smith Fuzzy extractors: how to generate strong keys from biometrics and other noisy data Advances in Cryptology EUROCRYPT 2004 LNCS vol. 3027 2004 Springer-Verlag 523 540
-
(2004)
Advances in Cryptology
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
18
-
-
78449261166
-
Biometric identity based signature revisited, in: European PKI Workshop-EuroPKI 2009
-
Springer-Verlag
-
N.D. Sarier Biometric identity based signature revisited, in: European PKI Workshop-EuroPKI 2009 LNCS vol. 6391 2010 Springer-Verlag 271 285
-
(2010)
LNCS
, vol.6391
, pp. 271-285
-
-
Sarier, N.D.1
-
19
-
-
0034140431
-
Keystroke dynamics as a biometric for authentication
-
DOI 10.1016/S0167-739X(99)00059-X
-
F. Monrose, and A.D. Rubin Keystroke dynamics as a biometric for authentication Future Generation Computer Systems 16 4 2000 351 359 (Pubitemid 30552905)
-
(2000)
Future Generation Computer Systems
, vol.16
, Issue.4
, pp. 351-359
-
-
Monrose, F.1
Rubin, A.D.2
-
20
-
-
84947237328
-
On the security of joint signature and encryption
-
EUROCRYPT 2002 LNCS Springer-Verlag
-
J.H. An, Y. Dodis, and T. Rabin On the security of joint signature and encryption Advances in Cryptology EUROCRYPT 2002 LNCS vol. 2332 2002 Springer-Verlag 83 107
-
(2002)
Advances in Cryptology
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
|