-
1
-
-
63449122349
-
Digital signcryption or how to achieve cost(signature + encryption) << cost(signature) + cost(encryption)
-
Y. Zheng, Digital signcryption or how to achieve cost(signature + encryption) << cost(signature) + cost(encryption), Proc. of 17th Annual International Cryptology Conference, pp. 165-179, 1997.
-
(1997)
Proc. of 17th Annual International Cryptology Conference
, pp. 165-179
-
-
Zheng, Y.1
-
2
-
-
0040712314
-
Efficient signcryption schemes on elliptic curves
-
Y. Zheng and H. Imai, Efficient signcryption schemes on elliptic curves, Information Processing Letters, vol. 68, no. 5, pp. 227-233, 1998.
-
(1998)
Information Processing Letters
, vol.68
, Issue.5
, pp. 227-233
-
-
Zheng, Y.1
Imai, H.2
-
3
-
-
84947237328
-
On the security of joint signature and encryption
-
J. H. An, Y. Dodis, and T. Rabin, On the security of joint signature and encryption, Proc. of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology, pp. 83-107, 2002.
-
(2002)
Proc. of the International Conference On the Theory and Applications of Cryptographic Techniques: Advances In Cryptology
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
4
-
-
35248874429
-
Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography
-
X. Boyen, Multipurpose identity-based signcryption: a swiss army knife for identity-based cryptography, Proc. of 23rd Annual International Cryptology Conference, pp. 383-399, 2003.
-
(2003)
Proc. of 23rd Annual International Cryptology Conference
, pp. 383-399
-
-
Boyen, X.1
-
6
-
-
77956318476
-
An efficient identity-based signcryption scheme for multiple receivers
-
S. S. D. Selvi, S. S. Vivek, R. Srinivasan, and C. P. Rangan, An efficient identity-based signcryption scheme for multiple receivers, Proc. of the 4th International Workshop on Security: Advances in Information and Computer Security, pp. 71-88, 2009.
-
(2009)
Proc. of the 4th International Workshop On Security: Advances In Information and Computer Security
, pp. 71-88
-
-
Selvi, S.S.D.1
Vivek, S.S.2
Srinivasan, R.3
Rangan, C.P.4
-
7
-
-
77649248439
-
Efficient constructions of signcryption schemes and signcryption composability
-
T. Matsuda, K. Matsuura, and J. C. N. Schuldt, Efficient constructions of signcryption schemes and signcryption composability, Proc. of the 10th International Conference on Cryptology in India: Progress in Cryptology, pp. 321-342, 2009.
-
(2009)
Proc. of the 10th International Conference On Cryptology In India: Progress In Cryptology
, pp. 321-342
-
-
Matsuda, T.1
Matsuura, K.2
Schuldt, J.C.N.3
-
9
-
-
84863293148
-
Identity-based signcryption from identity-based cryptography
-
W. Lee, J. W. Seo, and P. J. Lee, Identity-based signcryption from identity-based cryptography, Proc. of 12th International Workshop on Information Security Applications, pp. 70-83, 2012.
-
(2012)
Proc. of 12th International Workshop On Information Security Applications
, pp. 70-83
-
-
Lee, W.1
Seo, J.W.2
Lee, P.J.3
-
10
-
-
0041291986
-
Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile
-
R. Housley, W. Polk, W. Ford, and D. Solo, Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, The Internet Society, 2002.
-
(2002)
The Internet Society
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
11
-
-
84957678021
-
Fast digital identity revocation
-
W. Aiello, S. Lodha, and R. Ostrovsky, Fast digital identity revocation, Proc. of 18th Annual International Cryptology Conference, pp. 137-152, 1998.
-
(1998)
Proc. of 18th Annual International Cryptology Conference
, pp. 137-152
-
-
Aiello, W.1
Lodha, S.2
Ostrovsky, R.3
-
12
-
-
24944532382
-
Novomodo: Scalable certificate validation and simplified PKI management
-
S. Micali, Novomodo: scalable certificate validation and simplified PKI management, Proc. of 1st Annual PKI Research Workshop, pp. 15-25, 2002.
-
(2002)
Proc. of 1st Annual PKI Research Workshop
, pp. 15-25
-
-
Micali, S.1
-
14
-
-
35048865318
-
QuasiModo: Efficient certificate validation and revocation
-
F. F. Elwailly, C. Gentry, and Z. Ramzan, QuasiModo: efficient certificate validation and revocation, Proc. of 7th International Workshop on Theory and Practice in Public Key Cryptography, pp. 375-388, 2004.
-
(2004)
Proc. of 7th International Workshop On Theory and Practice In Public Key Cryptography
, pp. 375-388
-
-
Elwailly, F.F.1
Gentry, C.2
Ramzan, Z.3
-
21
-
-
24944445896
-
Batch verifications with ID-based signatures
-
H. J. Yoon, J. H. Cheon, and Y. Kim, Batch verifications with ID-based signatures, Proc. of 7th International Conference on Information Security and Cryptology, pp. 233-248, 2005.
-
(2005)
Proc. of 7th International Conference On Information Security and Cryptology
, pp. 233-248
-
-
Yoon, H.J.1
Cheon, J.H.2
Kim, Y.3
-
22
-
-
71149103376
-
An efficient and provably secure ID-based signature scheme with batch verifications
-
Y. M. Tseng, T. Y. Wu, and J. D. Wu, An efficient and provably secure ID-based signature scheme with batch verifications, International Journal of Innovative Computing, Information and Control, vol. 5, no. 11, pp. 3911-3922, 2009.
-
(2009)
International Journal of Innovative Computing, Information and Control
, vol.5
, Issue.11
, pp. 3911-3922
-
-
Tseng, Y.M.1
Wu, T.Y.2
Wu, J.D.3
-
23
-
-
34347393777
-
Identity-based key agreement protocols from pairings
-
L. Chen, Z. Cheng, and N. P. Smart, Identity-based key agreement protocols from pairings, International Journal of Information Security, vol. 6, no. 4, pp. 213-241, 2007.
-
(2007)
International Journal of Information Security
, vol.6
, Issue.4
, pp. 213-241
-
-
Chen, L.1
Cheng, Z.2
Smart, N.P.3
-
24
-
-
77955703761
-
An ID-based mutual authentication and key exchange protocol for low-power mobile devices
-
T. Y. Wu and Y. M. Tseng, An ID-based mutual authentication and key exchange protocol for low-power mobile devices, The Computer Journal, vol. 53, no. 7, pp. 1062-1070, 2010.
-
(2010)
The Computer Journal
, vol.53
, Issue.7
, pp. 1062-1070
-
-
Wu, T.Y.1
Tseng, Y.M.2
-
25
-
-
77955659710
-
An efficient user authentication and key exchange protocol for mobile client-server environment
-
T. Y. Wu and Y. M. Tseng, An efficient user authentication and key exchange protocol for mobile client-server environment, Journal of Computer Networks, vol. 54, no. 9, pp. 1520-1530, 2010.
-
(2010)
Journal of Computer Networks
, vol.54
, Issue.9
, pp. 1520-1530
-
-
Wu, T.Y.1
Tseng, Y.M.2
-
26
-
-
35048874197
-
Efficient ID-based group key agreement with bilinear maps
-
K. Y. Choi, J. Y. Hwang, and D. H. Lee, Efficient ID-based group key agreement with bilinear maps, Proc. of International Workshop on Theory and Practice in Public Key Cryptography, pp. 130-144, 2004.
-
(2004)
Proc. of International Workshop On Theory and Practice In Public Key Cryptography
, pp. 130-144
-
-
Choi, K.Y.1
Hwang, J.Y.2
Lee, D.H.3
-
27
-
-
79958112453
-
A secure ID-based authenticated group key exchange protocol resistant to insider attacks
-
T. Y. Wu, Y. M. Tseng, and C. W. Yu, A secure ID-based authenticated group key exchange protocol resistant to insider attacks, Journal of Information Science and Engineering, vol. 27, pp. 915-932, 2011.
-
(2011)
Journal of Information Science and Engineering
, vol.27
, pp. 915-932
-
-
Wu, T.Y.1
Tseng, Y.M.2
Yu, C.W.3
-
28
-
-
84863643575
-
Towards ID-based authenticated group key exchange protocol with identifying malicious participants
-
T. Y. Wu and Y. M. Tseng, Towards ID-based authenticated group key exchange protocol with identifying malicious participants, Journal of Informatica, vol. 23, no. 2, pp. 315-334, 2012.
-
(2012)
Journal of Informatica
, vol.23
, Issue.2
, pp. 315-334
-
-
Wu, T.Y.1
Tseng, Y.M.2
-
29
-
-
64249165649
-
Security proofs for identity-based identification and signature schemes
-
M. Bellare, C. Namprempre, and G. Neven, Security proofs for identity-based identification and signature schemes, Journal of Cryptology, vol. 22, no. 1, pp. 1-61, 2009.
-
(2009)
Journal of Cryptology
, vol.22
, Issue.1
, pp. 1-61
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
-
30
-
-
47949104161
-
A pairing-based user authentication scheme for wireless clients with smart cards
-
Y. M. Tseng, T. Y. Wu, and J. D. Wu, A pairing-based user authentication scheme for wireless clients with smart cards, Journal of Informatica, vol. 19, no. 2, pp. 285-302, 2008.
-
(2008)
Journal of Informatica
, vol.19
, Issue.2
, pp. 285-302
-
-
Tseng, Y.M.1
Wu, T.Y.2
Wu, J.D.3
-
31
-
-
69949166012
-
Identity-based encryption with efficient revocation
-
A. Boldyreva, V. Goyal, and V. Kumar, Identity-based encryption with efficient revocation, Proc. of the 15th ACM conference on Computer and communications security, pp. 417-426, 2008.
-
(2008)
Proc. of the 15th ACM Conference On Computer and Communications Security
, pp. 417-426
-
-
Boldyreva, A.1
Goyal, V.2
Kumar, V.3
-
33
-
-
84859342049
-
Efficient revocable ID-based encryption with a public channel
-
Y. M. Tseng and T. T. Tsai, Efficient revocable ID-based encryption with a public channel, The Computer Journal, vol. 55, no. 4, pp. 475-486, 2012.
-
(2012)
The Computer Journal
, vol.55
, Issue.4
, pp. 475-486
-
-
Tseng, Y.M.1
Tsai, T.T.2
-
34
-
-
84867167893
-
Revocable ID-based signature scheme with batch verifications
-
T. Y. Wu, T. T. Tsai, and Y. M. Tseng, Revocable ID-based signature scheme with batch verifications, Proc. of 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 49-54, 2012.
-
(2012)
Proc. of 8th International Conference On Intelligent Information Hiding and Multimedia Signal Processing
, pp. 49-54
-
-
Wu, T.Y.1
Tsai, T.T.2
Tseng, Y.M.3
-
35
-
-
84863621901
-
A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants
-
T. Y. Wu, Y. M. Tseng, and T. T. Tsai, A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants, Journal of Computer Networks, vol. 56, no. 12, pp. 2994-3006, 2012.
-
(2012)
Journal of Computer Networks
, vol.56
, Issue.12
, pp. 2994-3006
-
-
Wu, T.Y.1
Tseng, Y.M.2
Tsai, T.T.3
-
37
-
-
4243180376
-
The random oracle methodology, revisited
-
R. Canetti, O. Goldreich, and S. Halevi, The random oracle methodology, revisited, Journal of ACM, vol. 51, no. 4, pp. 557-594, 2004.
-
(2004)
Journal of ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
38
-
-
53249117524
-
Pairings for cryptographers
-
S. D. Galbraith, K. G. Paterson, and N. P. Smart, Pairings for cryptographers, Journal of Discrete Applied Mathematics, vol. 156, no. 16, pp. 3113-3121, 2008.
-
(2008)
Journal of Discrete Applied Mathematics
, vol.156
, Issue.16
, pp. 3113-3121
-
-
Galbraith, S.D.1
Paterson, K.G.2
Smart, N.P.3
|