-
1
-
-
0345490607
-
Certificateless public key cryptography
-
Springer-Verlag. Lecture Notes in Computer Science No. 2894
-
S. S. Al-Riyami and K. Paterson. Certificateless public key cryptography. In Proc. ASIACRYPT 2003, pages 452-473. Springer-Verlag, 2003. Lecture Notes in Computer Science No. 2894.
-
(2003)
Proc. ASIACRYPT 2003
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.2
-
3
-
-
33645958856
-
Certificateless public key encryption without pairing
-
Springer-Verlag. Lecture Notes in Computer Science
-
J. Baek, R. Safavi-Naini, and W. Susilo. Certificateless public key encryption without pairing. In ISC 05, pages 134-148. Springer-Verlag, 2005. Lecture Notes in Computer Science Vol. 3650.
-
(2005)
ISC 05
, vol.3650
, pp. 134-148
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
6
-
-
24944511263
-
Public traceability in traitor tracing schemes
-
volume 3494 of LNCS, Springer
-
H. Chabanne, D. H. Phan, and D. Pointcheval. Public traceability in traitor tracing schemes. In Proc. EUROCRYPT 2005, volume 3494 of LNCS, pages 542-558. Springer, 2005.
-
(2005)
Proc. EUROCRYPT 2005
, pp. 542-558
-
-
Chabanne, H.1
Phan, D.H.2
Pointcheval, D.3
-
8
-
-
33745818483
-
Security-mediated certificateless cryptography
-
volume 3958 of Lecture Notes in Computer Science. Springer-Verlag
-
S. Chow, C. Boyd, and J. Gonzalez. Security-mediated certificateless cryptography. In PKC 2006, volume 3958 of Lecture Notes in Computer Science, pages 508-524. Springer-Verlag, 2006.
-
(2006)
PKC 2006
, pp. 508-524
-
-
Chow, S.1
Boyd, C.2
Gonzalez, J.3
-
10
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
Springer-Verlag. Lecture Notes in Computer Science No. 2656
-
C. Gentry. Certificate-based encryption and the certificate revocation problem. In Proc. EUROCRYPT 2003, pages 272-293. Springer-Verlag, 2003. Lecture Notes in Computer Science No. 2656.
-
(2003)
Proc. EUROCRYPT 2003
, pp. 272-293
-
-
Gentry, C.1
-
11
-
-
84937570422
-
Self-certified public keys
-
Springer-Verlag. Lecture Notes in Computer Science No. 547
-
M. Girault. Self-certified public keys. In Proc. EUROCRYPT 91, pages 490-497. Springer-Verlag, 1992. Lecture Notes in Computer Science No. 547.
-
(1992)
Proc. EUROCRYPT 91
, pp. 490-497
-
-
Girault, M.1
-
12
-
-
75649133312
-
An effective certificateless signature scheme based on bilinear pairings
-
INSTICC Press
-
M. Gorantla, R. Gangishetti, M. Das, and A. Saxena. An effective certificateless signature scheme based on bilinear pairings. In WOSIS 2005, pages 31-39. INSTICC Press, 2005.
-
(2005)
WOSIS 2005
, pp. 31-39
-
-
Gorantla, M.1
Gangishetti, R.2
Das, M.3
Saxena, A.4
-
13
-
-
33746370456
-
Key replacement attack against a generic construction of certificateless signature
-
Springer-Verlag. Lecture Notes in Computer Science No. 4058
-
B. Hu, D. Wong, Z. Zhang, and X. Deng. Key replacement attack against a generic construction of certificateless signature. In ACISP '06, pages 235-246. Springer-Verlag, 2006. Lecture Notes in Computer Science No. 4058.
-
(2006)
ACISP '06
, pp. 235-246
-
-
Hu, B.1
Wong, D.2
Zhang, Z.3
Deng, X.4
-
14
-
-
33744786523
-
On the security of certificateless signature schemes from Asiacrypt 2003
-
Springer-Verlag. Lecture Notes in Computer Science No. 3810
-
X. Huang, W. Susilo, Y. Mu, and F. Zhang. On the security of certificateless signature schemes from Asiacrypt 2003. In CANS 2005, pages 13-25. Springer-Verlag, 2005. Lecture Notes in Computer Science No. 3810.
-
(2005)
CANS 2005
, pp. 13-25
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
15
-
-
33751113672
-
Certificateless designated verifier signature schemes
-
April 18-20, [doi: 10.1109/AINA.2006.124]
-
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang, Certificateless Designated Verifier Signature Schemes, Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 2 (AINA'06), p.15-19, April 18-20, 2006 [doi: 10.1109/AINA.2006.124]
-
(2006)
Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 2 (AINA'06)
, pp. 15-19
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
16
-
-
33745833916
-
On constructing certificateless cryptosystems from identity based encryption
-
Springer-Verlag. Lecture Notes in Computer Science No. 3958
-
B. Libert and J. Quisquater. On constructing certificateless cryptosystems from identity based encryption. In PKC 2006, pages 474-490. Springer-Verlag, 2006. Lecture Notes in Computer Science No. 3958.
-
(2006)
PKC 2006
, pp. 474-490
-
-
Libert, B.1
Quisquater, J.2
-
17
-
-
84876341103
-
Self-generated-certificate public key cryptography and certificateless signature / encryption scheme in the standard model
-
J. K. Liu, M. H. Au, and W. Susilo. Self-generated-certificate public key cryptography and certificateless signature / encryption scheme in the standard model. Cryptology ePrint Archive, Report 2006/373, 2006. http://eprint.iacr.org/ .
-
(2006)
Cryptology EPrint Archive, Report 2006/373
-
-
Liu, J.K.1
Au, M.H.2
Susilo, W.3
-
19
-
-
33746340815
-
Efficient identity-based signatures secure in the standard model
-
To Appear in ACISP 2006
-
K. Paterson and J. Schuldt. Efficient identity-based signatures secure in the standard model. Cryptology ePrint Archive, Report 2006/080, 2006. http://eprint.iacr.org/2006/080/, To Appear in ACISP 2006.
-
(2006)
Cryptology EPrint Archive, Report 2006/080
-
-
Paterson, K.1
Schuldt, J.2
-
22
-
-
0037611030
-
A note on Girault's self-certified model
-
30 June. [doi: 10.1016/S0020-0190(03)00203-5]
-
Shahrokh Saeednia, A note on Girault's self-certified model, Information Processing Letters, v.86 n.6, p.323-327, 30 June 2003 [doi: 10.1016/S0020- 0190(03)00203-5]
-
(2003)
Information Processing Letters
, vol.86
, Issue.6
, pp. 323-327
-
-
Saeednia, S.1
-
23
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
August, Santa Barbara, California, United States
-
Adi Shamir, Identity-based cryptosystems and signature schemes, Proceedings of CRYPTO 84 on Advances in cryptology, p.47-53, August 1985, Santa Barbara, California, United States
-
(1985)
Proceedings of CRYPTO 84 on Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
24
-
-
38049036156
-
Provable efficient certificateless public key encryption
-
Y. Shi and J. Li. Provable efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/287, 2005. http://eprint.iacr.org/2005/287/.
-
(2005)
Cryptology EPrint Archive, Report 2005/287
-
-
Shi, Y.1
Li, J.2
-
25
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
volume 1233 of Lecture Notes in Computer Science. Springer
-
V. Shoup. Lower bounds for discrete logarithms and related problems. In Proc. EUROCRYPT 97, volume 1233 of Lecture Notes in Computer Science, pages 250-266. Springer, 1997.
-
(1997)
Proc. EUROCRYPT 97
, pp. 250-266
-
-
Shoup, V.1
-
26
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
volume 3494 of LNCS. Springer-Verlag
-
B. Waters. Efficient identity-based encryption without random oracles. In Proc. EUROCRYPT 2005, volume 3494 of LNCS, pages 114-127. Springer-Verlag, 2005.
-
(2005)
Proc. EUROCRYPT 2005
, pp. 114-127
-
-
Waters, B.1
-
27
-
-
33645584388
-
Generic construction of certificateless encryption
-
Springer-Verlag. Lecture Notes in Computer Science No. 3040
-
D. H. Yum and P. J. Lee. Generic construction of certificateless encryption. In ICCSA '04, pages 802-811. Springer-Verlag, 2004. Lecture Notes in Computer Science No. 3040.
-
(2004)
ICCSA '04
, pp. 802-811
-
-
Yum, D.H.1
Lee, P.J.2
-
28
-
-
35048832495
-
Generic construction of certificateless signature
-
Springer-Verlag. Lecture Notes in Computer Science No. 3108
-
D. H. Yum and P. J. Lee. Generic construction of certificateless signature. In ACISP '04, pages 200-211. Springer-Verlag, 2004. Lecture Notes in Computer Science No. 3108.
-
(2004)
ACISP '04
, pp. 200-211
-
-
Yum, D.H.1
Lee, P.J.2
|