-
1
-
-
0345490607
-
Certificateless public key cryptography
-
Lect. Notes Comput. Sci. Springer
-
S.S. Al-Riyami, and K. Paterson Certificateless public key cryptography Proceedings of Asiacrypt 2003 Lect. Notes Comput. Sci. vol. 2894 2003 Springer 452 473
-
(2003)
Proceedings of Asiacrypt 2003
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.2
-
2
-
-
84876300178
-
Malicious KGC attack in certificateless cryptography
-
ACM
-
M.H. Au, J. Chen, J.K. Liu, Y. Mu, D.S. Wong, and G. Yang Malicious KGC attack in certificateless cryptography Proceedings of ASIACCS 2007 2007 ACM 302 311
-
(2007)
Proceedings of ASIACCS 2007
, pp. 302-311
-
-
Au, M.H.1
Chen, J.2
Liu, J.K.3
Mu, Y.4
Wong, D.S.5
Yang, G.6
-
3
-
-
35048832490
-
An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
-
Lect. Notes Comput. Sci. Springer
-
M. Bellare, A. Boldyreva, and A. Palacio An uninstantiable random-oracle-model scheme for a hybrid-encryption problem Proceedings of Eurocrypt 2004 Lect. Notes Comput. Sci. vol. 3027 2004 Springer 171 188
-
(2004)
Proceedings of Eurocrypt 2004
, vol.3027
, pp. 171-188
-
-
Bellare, M.1
Boldyreva, A.2
Palacio, A.3
-
4
-
-
84947906522
-
The exact security of digital signatures - how to sign with RSA and Rabin
-
M. Bellare, and P. Rogaway The exact security of digital signatures - how to sign with RSA and Rabin Proceedings of Eurocrypt 1996 Lect. Notes Comput. Sci. vol. 1070 1996 Springer 399 416 (Pubitemid 126071082)
-
(1996)
Lecture Notes In Computer Science
, Issue.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
4243180376
-
The random oracle methodology revised
-
R. Canetti, O. Goldreich, and S. Halevi The random oracle methodology revised J. ACM 51 4 2004 557 594
-
(2004)
J. ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
6
-
-
38149080541
-
Certificateless signature revisited
-
Lect. Notes Comput. Sci. Springer
-
X. Huang, Y. Mu, W. Susilo, D.S. Wong, and W. Wu Certificateless signature revisited Proceedings of ACISP 2007 Lect. Notes Comput. Sci. vol. 4586 2007 Springer 308 322
-
(2007)
Proceedings of ACISP 2007
, vol.4586
, pp. 308-322
-
-
Huang, X.1
Mu, Y.2
Susilo, W.3
Wong, D.S.4
Wu, W.5
-
7
-
-
84876341103
-
Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model
-
ACM
-
J.K. Liu, M.H. Au, and W. Susilo Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model Proceedings of ASIACCS 2007 2007 ACM 273 283
-
(2007)
Proceedings of ASIACCS 2007
, pp. 273-283
-
-
Liu, J.K.1
Au, M.H.2
Susilo, W.3
-
9
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Lect. Notes Comput. Sci. Springer
-
A. Shamir Identity-based cryptosystems and signature schemes Proceedings of Crypto 1984 Lect. Notes Comput. Sci. vol. 196 1984 Springer 47 53
-
(1984)
Proceedings of Crypto 1984
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
10
-
-
84863237272
-
Security pitfalls of the certificateless signature and multi-receiver signcryption schemes
-
K. Shim, and Y.R. Lee Security pitfalls of the certificateless signature and multi-receiver signcryption schemes Fundam. Inform. 112 4 2011 365 376
-
(2011)
Fundam. Inform.
, vol.112
, Issue.4
, pp. 365-376
-
-
Shim, K.1
Lee, Y.R.2
-
11
-
-
24944566040
-
Efficient Identity-Based Encryption without random oracles
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
B. Waters Efficient identity-based encryption without random oracles Proceedings of Eurocrypt 2005 Lect. Notes Comput. Sci. vol. 3494 2005 Springer 114 127 (Pubitemid 41313949)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
12
-
-
77955436425
-
Key replacement attack on two certificateless signature schemes without random oracles
-
Q. Xia, C.X. Xu, and Y. Yu Key replacement attack on two certificateless signature schemes without random oracles Key Eng. Mater. 439-440 2010 1606 1611
-
(2010)
Key Eng. Mater.
, vol.439-440
, pp. 1606-1611
-
-
Xia, Q.1
Xu, C.X.2
Yu, Y.3
-
13
-
-
58149512474
-
An improved certificateless signature scheme secure in the standard model
-
H. Xiong, Z.G. Qin, and F.G. Li An improved certificateless signature scheme secure in the standard model Fundam. Inform. 88 1-2 2008 193 206
-
(2008)
Fundam. Inform.
, vol.88
, Issue.12
, pp. 193-206
-
-
Xiong, H.1
Qin, Z.G.2
Li, F.G.3
-
14
-
-
84863572750
-
Improved certificateless signature scheme provably secure in the standard model
-
Y. Yu, Y. Mu, G. Wang, Q. Xia, and B. Yang Improved certificateless signature scheme provably secure in the standard model IET Inf. Secur. 6 2 2012 102 110
-
(2012)
IET Inf. Secur.
, vol.6
, Issue.2
, pp. 102-110
-
-
Yu, Y.1
Mu, Y.2
Wang, G.3
Xia, Q.4
Yang, B.5
-
15
-
-
70350648522
-
Certificateless signature scheme without random oracles
-
Lect. Notes Comput. Sci. Springer
-
Y. Yuan, D. Li, L. Tian, and H. Zhu Certificateless signature scheme without random oracles Proceedings of ISA 2009 Lect. Notes Comput. Sci. vol. 5576 2009 Springer 31 40
-
(2009)
Proceedings of ISA 2009
, vol.5576
, pp. 31-40
-
-
Yuan, Y.1
Li, D.2
Tian, L.3
Zhu, H.4
-
16
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its applications
-
Lect. Notes Comput. Sci. Springer
-
F. Zhang, R. Safavi-Naini, and W. Susilo An efficient signature scheme from bilinear pairings and its applications Proceedings of PKC 2004 Lect. Notes Comput. Sci. vol. 2947 2004 Springer 277 290
-
(2004)
Proceedings of PKC 2004
, vol.2947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
|