-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Shamir, A.: ' Identity-based cryptosystems and signature schemes ', Proc. CRYPTO 84 on Advances in Cryptology, 1984, p. 47-53, (LNCS, 196)
-
(1984)
Proc. CRYPTO 84 on Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
0345490607
-
Certificateless public key cryptography
-
Al-Riyami, S.S., and Paterson, K.G.: ' Certificateless public key cryptography ', Proc. Asiacrypt 2003, 2003, p. 452-473, (LNCS, 2849)
-
(2003)
Proc. Asiacrypt 2003
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
3
-
-
33744786523
-
On the security of certificateless signature schemes from Asiacrypt 2003
-
Cryptology and Network Security - 4th International Conference, CANS 2005, 3810 LNCS Proceedings
-
Huang, X.Y., Susilo, W., Mu, Y., and Zhang, F.T.: ' On the security of certificateless signature schemes from Asiacrypt 2003 ', Proc. CANS 2005, 2005, p. 13-25, (LNCS, 3810) (Pubitemid 43829589)
-
(2005)
Lecture Notes in Computer Science Including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
, pp. 13-25
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
4
-
-
35048832495
-
Generic construction of certificateless signature
-
Yum, D.H., and Lee, P.J.: ' Generic construction of certificateless signature ', Proc. ACISP 2004, 2004, p. 200-211, (LNCS, 3108)
-
(2004)
Proc. ACISP 2004
, pp. 200-211
-
-
Yum, D.H.1
Lee, P.J.2
-
5
-
-
33746370456
-
Key replacement attack against a generic construction of certificateless signature
-
Information Security and Privacy: 11th Australasian Conference, 4058 LNCS ACISP 2006, Proceedings
-
Hu, B.C., Wong, D.S., Zhang, Z., and Deng, X.: ' Key replacement attack against a generic construction of certificateless signature ', Proc. ACISP 2006, 2006, p. 235-246, (LNCS, 4058) (Pubitemid 44113014)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 235-246
-
-
Hu, B.C.1
Wong, D.S.2
Zhang, Z.3
Deng, X.4
-
6
-
-
33646852592
-
An efficient certificateless signature scheme
-
Gorantla, M.C., and Saxena, A.: ' An efficient certificateless signature scheme ', Proc. CIS 2005, p. 110-116, (LNCS, 3802)
-
Proc. CIS 2005
, pp. 110-116
-
-
Gorantla, M.C.1
Saxena, A.2
-
8
-
-
38049001959
-
Security analysis of two signature schemes and their improved schemes
-
Zhang, J., and Mao, J.: ' Security analysis of two signature schemes and their improved schemes ', Proc. ICCSA 2007, 2007, p. 589-602, (LNCS, 4705, Part I)
-
(2007)
Proc. ICCSA 2007
, pp. 589-602
-
-
Zhang, J.1
Mao, J.2
-
9
-
-
38149080541
-
Certificateless signature revisited
-
Huang, X., Mu, Y., Susilo, W., Wong, D.S., and Wu, W.: ' Certificateless signature revisited ', Proc. ACISP 2007, 2007, p. 308-322, (LNCS, 4586)
-
(2007)
Proc. ACISP 2007
, pp. 308-322
-
-
Huang, X.1
Mu, Y.2
Susilo, W.3
Wong, D.S.4
Wu, W.5
-
10
-
-
56149108570
-
Breaking the short certificateless signature scheme
-
10.1016/j.ins.2008.08.024
-
Shim, K.: ' Breaking the short certificateless signature scheme ', Inf. Sci., 2009, 179, p. 303-306 10.1016/j.ins.2008.08.024
-
(2009)
Inf. Sci.
, vol.179
, pp. 303-306
-
-
Shim, K.1
-
12
-
-
0031619016
-
The random oracle methodology, revisited
-
Canetti, R., Goldreich, O., and Halevi, S.: ' The random oracle methodology, revisited ', Proc. 30th Annual Symp. on Theory of Computing (STOC'98), 1998, p. 209-218
-
(1998)
Proc. 30th Annual Symp. on Theory of Computing (STOC'98)
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
13
-
-
24944566040
-
Efficient Identity-Based Encryption without random oracles
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Waters, B.: ' Efficient identity based encryption without random oracles ', Advances in Cryptology-EUROCRYPT 2005, 2005, p. 114-127, (LNCS, 3494) (Pubitemid 41313949)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
14
-
-
33746372179
-
Efficient identity-based signatures secure in the standard model
-
DOI 10.1007/11780656-18, Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Proceedings 4058 LNCS
-
Paterson, K.G., and Schuldt, J.C.N.: ' Efficient identity-based signatures secure in the standard model ', Proc. ACISP 2006, 2006, p. 207-222, (LNCS, 4058) (Pubitemid 44113012)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 207-222
-
-
Paterson, K.G.1
Schuldt, J.C.N.2
-
15
-
-
84876341103
-
Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model
-
Liu, J.K., and Au, M.H.: ' Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model ', Proc. 2007 ACM Symp. on Information, Computer and Communications Security-ASIACCS'2007, 2007, p. 273-283
-
(2007)
Proc. 2007 ACM Symp. on Information, Computer and Communications Security-ASIACCS'2007
, pp. 273-283
-
-
Liu, J.K.1
Au, M.H.2
-
16
-
-
58149512474
-
An improved certificateless signature scheme secure in the standard model
-
Xiong, H., Qin, Z., and Li, F.: ' An improved certificateless signature scheme secure in the standard model ', Fundamenta Informaticae, 2008, 88, p. 193-206
-
(2008)
Fundamenta Informaticae
, vol.88
, pp. 193-206
-
-
Xiong, H.1
Qin, Z.2
Li, F.3
-
17
-
-
70350648522
-
Certificateless signature scheme without random oracles
-
Yuan, Y., Li, D., Tian, L., and Zhu, H.: ' Certificateless signature scheme without random oracles ', Proc. ISA 2009, 2009, p. 31-40, (LNCS, 5576)
-
(2009)
Proc. ISA 2009
, pp. 31-40
-
-
Yuan, Y.1
Li, D.2
Tian, L.3
Zhu, H.4
-
18
-
-
77955436425
-
Key replacement attack on two certificateless signature schemes without random oracles
-
10.4028/www.scientific.net/KEM.439-440.1606 1013-9826
-
Xia, Q., Xu, C.X., and Yu, Y.: ' Key replacement attack on two certificateless signature schemes without random oracles ', Key Eng. Mater., 2010, 439-440, p. 1606-1611 10.4028/www.scientific.net/KEM.439-440.1606 1013-9826
-
(2010)
Key Eng. Mater.
, pp. 1606-1611
-
-
Xia, Q.1
Xu, C.X.2
Yu, Y.3
-
19
-
-
84874324906
-
Identity-based encryption from the Weil pairings
-
Boneh, D., and Franklin, M.: ' Identity-based encryption from the Weil pairings ', Proc. Advances in Cryptology-Crypto 2001, 2001, p. 213-229, (LNCS, 3494)
-
(2001)
Proc. Advances in Cryptology-Crypto 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
20
-
-
84876300178
-
Malicious KGC attacks in certificateless cryptography
-
Au, M.H., Chen, J., Liu, J.K., Mu, Y., Wong, D.S., and Yang, G.: ' Malicious KGC attacks in certificateless cryptography ', Proc. ASIACCS'07, 2007, p. 302-311
-
(2007)
Proc. ASIACCS'07
, pp. 302-311
-
-
Au, M.H.1
Chen, J.2
Liu, J.K.3
Mu, Y.4
Wong, D.S.5
Yang, G.6
-
21
-
-
0842304787
-
Unique signatures and verifiable random functions from the DH-DDH separation
-
Lysyanskaya, A.: ' Unique signatures and verifiable random functions from the DH-DDH separation ', Proc. CRYPTO 2004, 2004, p. 597-612, (LNCS, 2442)
-
(2004)
Proc. CRYPTO 2004
, pp. 597-612
-
-
Lysyanskaya, A.1
|