-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg(1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Odlyzko, A.M. (ed.) CRYPTO 1986. Springer, Heidelberg
-
Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
3
-
-
84947558992
-
A "Paradoxical" identity-based signature scheme resulting from zero-knowledge
-
Goldwasser, S. (ed.) CRYPTO 1988. Springer, Heidelberg
-
Guillou, L.C., Quisquater, J.-J.: A "Paradoxical" identity-based signature scheme resulting from zero-knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 216-231. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.403
, pp. 216-231
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
4
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Boneh, D., Franklin,M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
63449122349
-
Digital signcryption or how to achieve cost (Signature & encryption) << cost(Signature) + cost(Encryption)
-
Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Zheng, Y.: Digital signcryption or how to achieve cost (Signature & encryption) << cost(Signature) + cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165-179. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
6
-
-
33947512019
-
Formal proofs for the security of signcryption
-
Baek, J., Steinfeld, R., Zheng, Y.: Formal proofs for the security of signcryption. Journal of Cryptology 20(2), 203-235 (2007)
-
(2007)
Journal of Cryptology
, vol.20
, Issue.2
, pp. 203-235
-
-
Baek, J.1
Steinfeld, R.2
Zheng, Y.3
-
7
-
-
84958948780
-
A signcryption scheme with signature directly verifiable by public key
-
Public Key Cryptography
-
Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 55-59. Springer, Heidelberg (1998) (Pubitemid 128101696)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1431
, pp. 55-59
-
-
Bao, F.1
Deng, R.H.2
-
8
-
-
84944242785
-
A Signcryption Scheme Based on Integer Factorization
-
Steinfeld, R., Zheng, Y.: A signcryption scheme based on integer factorizatio. In: Okamoto, E., Pieprzyk, J.P., Seberry, J. (eds.) ISW 2000. LNCS, vol. 1975, pp. 308-322. Springer, Heidelberg (2000) (Pubitemid 33209765)
-
(2000)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1975
, pp. 308-322
-
-
Steinfeld, R.1
Zheng, Y.2
-
9
-
-
34347373013
-
Two birds one stone: Signcryption using RSA
-
Joye, M. (ed.) CT-RSA 2003. Springer, Heidelberg
-
Malone-Lee, J., Mao, W.: Two birds one stone: Signcryption using RSA. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 211-225. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2612
, pp. 211-225
-
-
Malone-Lee, J.1
Mao, W.2
-
10
-
-
0242445175
-
Identity based signcryption
-
Report 2002/098
-
Malone-Lee, J.: Identity based signcryption. Cryptology ePrint Archive, Report 2002/098 (2002), http://eprint.iacr.org/2002/098
-
(2002)
Cryptology ePrint Archive
-
-
Malone-Lee, J.1
-
11
-
-
84939205648
-
A new identity based signcryption schemes from pairings
-
Libert, B., Quisquater, J.J.: A new identity based signcryption schemes from pairings. In: 2003 IEEE Information Theory Workshop, Paris, France, pp. 155-158(2003)
-
(2003)
2003 IEEE Information Theory Workshop, Paris, France
, pp. 155-158
-
-
Libert, B.1
Quisquater, J.J.2
-
12
-
-
35048854673
-
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
-
Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. Springer, Heidelberg
-
Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352-369. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2971
, pp. 352-369
-
-
Chow, S.S.M.1
Yiu, S.M.2
Hui, L.C.K.3
Chow, K.P.4
-
13
-
-
35248874429
-
Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Boyen, X.: Multipurpose identity-based signcryption: a swiss army knife for identity-based cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 383-399. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 383-399
-
-
Boyen, X.1
-
14
-
-
24144498013
-
Improved identity-based signcryption
-
Vaudenay, S. (ed.) PKC 2005. Springer, Heidelberg
-
Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 362-379. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3386
, pp. 362-379
-
-
Chen, L.1
Malone-Lee, J.2
-
15
-
-
33646820668
-
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
-
DOI 10.1007/11593447-28, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515-532. Springer, Heidelberg (2005) (Pubitemid 43763493)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3788 LNCS
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.-J.4
-
16
-
-
78449258686
-
Identity based public verifiable signcryption scheme
-
Heng, S.-H., Kurosawa, K. (eds.) ProvSec 2010. Springer, Heidelberg
-
Selvi, S.S.D., Sree Vivek, S., Pandu Rangan, C.: Identity based public verifiable signcryption scheme. In: Heng, S.-H., Kurosawa, K. (eds.) ProvSec 2010. LNCS, vol. 6402, pp. 244-260. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6402
, pp. 244-260
-
-
Selvi, S.S.D.1
Sree Vivek, S.2
Pandu Rangan, C.3
-
17
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, pp. 62-73 (1993)
-
(1993)
1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
18
-
-
35048832490
-
An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
-
Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Bellare, M., Boldyreva, A., Palacio, A.: An uninstantiable random-oracle-model scheme for a hybrid-encryption problem. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 171-188. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 171-188
-
-
Bellare, M.1
Boldyreva, A.2
Palacio, A.3
-
19
-
-
4243180376
-
The random oracle methodology, revisited
-
Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. Journal of the ACM 51(4), 557-594 (2004)
-
(2004)
Journal of the ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
20
-
-
54349101206
-
Identity based signcryption scheme without random oracles
-
Yu, Y., Yang, B., Sun, Y., Zhu, S.: Identity based signcryption scheme without random oracles. Computer Standards & Interfaces 31(1), 56-62 (2009)
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.1
, pp. 56-62
-
-
Yu, Y.1
Yang, B.2
Sun, Y.3
Zhu, S.4
-
21
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
22
-
-
33746372179
-
Efficient identity-based signatures secure in the standard model
-
DOI 10.1007/11780656-18, Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Proceedings
-
Paterson, K.G., Schuldt, J.C.N.: Efficient identity-based signatures secure in the standard model. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 207-222. Springer, Heidelberg (2006) (Pubitemid 44113012)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4058 LNCS
, pp. 207-222
-
-
Paterson, K.G.1
Schuldt, J.C.N.2
-
23
-
-
77950628145
-
An improved semantically-secure identity-based signcryption scheme in the standard model
-
Jin, Z., Wen, Q., Du, H.: An improved semantically-secure identity-based signcryption scheme in the standard model. Computers & Electrical Engineering 36(3), 545-552 (2010)
-
(2010)
Computers & Electrical Engineering
, vol.36
, Issue.3
, pp. 545-552
-
-
Jin, Z.1
Wen, Q.2
Du, H.3
-
24
-
-
78650954166
-
Analysis of an identity-based signcryption scheme in the standard model
-
Li, F., Liao, Y., Qin, Z.: Analysis of an identity-based signcryption scheme in the standard model. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E94-A (1), 268-269 (2011)
-
(2011)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E94-A
, Issue.1
, pp. 268-269
-
-
Li, F.1
Liao, Y.2
Qin, Z.3
-
25
-
-
77956956687
-
Cryptanalysis of an identity based signcryption scheme without random oracles
-
Zhang, B.: Cryptanalysis of an identity based signcryption scheme without random oracles. Journal of Computational Information Systems 6(6), 1923-1931 (2010)
-
(2010)
Journal of Computational Information Systems
, vol.6
, Issue.6
, pp. 1923-1931
-
-
Zhang, B.1
-
26
-
-
43149089620
-
CCA2 secure IBE: Standard model efficiency through authenticated symmetric encryption
-
DOI 10.1007/978-3-540-79263-5-14, Topics in Cryptology - CT-RSA 2008 - The Cryptographers' Track at the RSA Conference 2008, Proceedings
-
Kiltz, E., Vahlis, Y.: CCA2 secure IBE: Standard model efficiency through authenticated symmetric encryption. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 221-238. Springer, Heidelberg (2008) (Pubitemid 351641986)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4964 LNCS
, pp. 221-238
-
-
Kiltz, E.1
Vahlis, Y.2
-
27
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing 33(1), 167-226 (2003)
-
(2003)
SIAM Journal on Computing
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
28
-
-
33745142417
-
Sequences of games: A tool for taming complexity in security proofs
-
Report 2004/332
-
Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332 (2004), http://eprint.iacr. org/2004/332
-
(2004)
Cryptology ePrint Archive
-
-
Shoup, V.1
-
29
-
-
84880904783
-
OAEP reconsidered
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Shoup, V.: OAEP reconsidered. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 239-259. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 239-259
-
-
Shoup, V.1
|