-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Santa Barbara, California, USA
-
Shamir A,. Identity-based cryptosystems and signature schemes. Proceedings of CRYPTO 84 on Advances in Cryptology, Santa Barbara, California, USA, 1984; 47-53.
-
(1984)
Proceedings of CRYPTO 84 on Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
4
-
-
55749090987
-
Efficient and provably-secure certificateless short signature scheme from bilinear pairings
-
Du H, Wen Q,. Efficient and provably-secure certificateless short signature scheme from bilinear pairings. Computer Standards & Interfaces 2009; 31: 390-394.
-
(2009)
Computer Standards & Interfaces
, vol.31
, pp. 390-394
-
-
Du, H.1
Wen, Q.2
-
5
-
-
33646852592
-
An efficient certificateless signature scheme
-
DOI 10.1007/11596981-16, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings
-
Gorantla M, Saxena A,. An efficient certificateless signature scheme. 2005 International Conference on Computational Intelligence and Security, Xi'an, China, 2005; 110-116. (Pubitemid 43775235)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3802 LNAI
, pp. 110-116
-
-
Gorantla, M.C.1
Saxena, A.2
-
6
-
-
33746370456
-
Key replacement attack against a generic construction of certificateless signature
-
Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Proceedings
-
Hu BC, Wong DS, Zhang Z, Deng X,. 2006. Key replacement attack against a generic construction of certificateless signature. In ACISP 2006, Vol. 4058, LNCS. Springer-Verlag: Melbourne, Australia; 235-246. (Pubitemid 44113014)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4058 LNCS
, pp. 235-246
-
-
Hu, B.C.1
Wong, D.S.2
Zhang, Z.3
Deng, X.4
-
7
-
-
33744786523
-
On the security of certificateless signature schemes from Asiacrypt 2003
-
Cryptology and Network Security - 4th International Conference, CANS 2005, Proceedings
-
Huang X, Susilo W, Mu Y, Zhang F,. On the security of certificateless signature schemes from asiacrypt 2003. In CANS 2005, Vol. 3810, LNCS. Springer-Verlag: Xiamen, Fujian Province, China, 2005; 13-25. (Pubitemid 43829589)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3810 LNCS
, pp. 13-25
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
8
-
-
18244396341
-
Certificateless signature and proxy signature schemes from bilinear pairings
-
DOI 10.1007/s10986-005-0008-5
-
Li X, Chen K, Sun L,. Certificateless Signature and Proxy Signature Schemes from Bilinear Pairings. Lithuanian Mathematical Journal 2005; 45: 76-83. (Pubitemid 40630178)
-
(2005)
Lithuanian Mathematical Journal
, vol.45
, Issue.1
, pp. 76-83
-
-
Li, X.1
Chen, K.2
Sun, L.3
-
9
-
-
38149008077
-
Security analysis of the certificateless signature scheme proposed at SecUbiq 2006
-
LNCS. Springer-Verlag: Taipei, Taiwan
-
Park J, Kang B,. Security analysis of the certificateless signature scheme proposed at SecUbiq 2006. In EUC Workshops 2007, Vol. 4809, LNCS. Springer-Verlag: Taipei, Taiwan, 2006; 686-691.
-
(2006)
EUC Workshops 2007
, vol.4809
, pp. 686-691
-
-
Park, J.1
Kang, B.2
-
10
-
-
79951510781
-
Efficient and short certificateless signatures secure against realistic adversaries
-
Tso R, Yi X, Huang X,. Efficient and short certificateless signatures secure against realistic adversaries. Journal of Supercomputing 2011; 55: 173-191.
-
(2011)
Journal of Supercomputing
, vol.55
, pp. 173-191
-
-
Tso, R.1
Yi, X.2
Huang, X.3
-
11
-
-
33749421203
-
An efficient certificateless signature scheme
-
Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings
-
Yap W, Heng S, Goi B,. An efficient certificateless signature scheme. 2006 Proceeding of Emerging Directions in Embedded and Ubiquitous Computing, 2006; 322-331. (Pubitemid 44503066)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4097 LNCS
, pp. 322-331
-
-
Yap, W.-S.1
Heng, S.-H.2
Goi, B.-M.3
-
13
-
-
33746591632
-
Certificateless public-key signature: Security model and efficient construction
-
Applied Cryptography and Network Security - 4th International Conference, ACNS 2006, Proceedings
-
Zhang Z, Wong D, Xu J,. Certificateless public-key signature: security model and efficient construction. 4th International Conference on Applied Cryptography and Network Security, Singapore, 2006; 293-308. (Pubitemid 44152825)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3989 LNCS
, pp. 293-308
-
-
Zhang, Z.1
Wong, D.S.2
Xu, J.3
Feng, D.4
-
14
-
-
66349121769
-
New efficient certificateless signature scheme
-
LNCS. Springer-Verlag: Taipei, Taiwan
-
Zhang L, Zhang F, Zhang F,. New efficient certificateless signature scheme. In EUC Workshops 2007, Vol. 4809, LNCS. Springer-Verlag: Taipei, Taiwan, 2007; 293-308.
-
(2007)
EUC Workshops 2007
, vol.4809
, pp. 293-308
-
-
Zhang, L.1
Zhang, F.2
Zhang, F.3
-
15
-
-
84865366436
-
An efficient and provably-secure certificateless signature scheme without bilinear pairings
-
DOI: 10.1002/dac.1330. Article first published online: 26 SEP 2011
-
He D, Chen J, Zhang R,. An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems. DOI: 10.1002/dac.1330. Article first published online: 26 SEP 2011.
-
International Journal of Communication Systems
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
16
-
-
4243180376
-
The random oracle methodology, revisited
-
Canetti R, Goldreich O, Halevi S,. The random oracle methodology, revisited. Journal of ACM 2004; 51 (4): 557-594.
-
(2004)
Journal of ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
17
-
-
0000901529
-
Security Arguments for Digital Signatures and Blind Signatures
-
David P, Jacque S,. Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology 2000; 13 (3): 361-396.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
David, P.1
Jacque, S.2
-
18
-
-
38149080541
-
Certificateless signature revisited
-
LNCS. Springer-Verlag: Townsville, Australia
-
Huang X, Mu Y, Susilo W, Wong DS, Wu W,. Certificateless signature revisited. In ACISP 2007, Vol. 4586, LNCS. Springer-Verlag: Townsville, Australia, 2007; 308-322.
-
(2007)
ACISP 2007
, vol.4586
, pp. 308-322
-
-
Huang, X.1
Mu, Y.2
Susilo, W.3
Wong, D.S.4
Wu, W.5
|