-
1
-
-
85020598353
-
-
In Advances in Cryptology, vol. 196 of Lecture Notes in Computer Science
-
Shamir A. Identity-based cryptosystems and signature schemes. In Advances in Cryptology, vol. 196 of Lecture Notes in Computer Science, 1984; 47-53.
-
(1984)
Identity-based cryptosystems and signature schemes
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
0345490607
-
-
Certificateless public key cryptography, Proceedings of ASIACRYPT'03, Taipei, Taiwan
-
Al-Riyami SS, Paterson KG. Certificateless public key cryptography, Proceedings of ASIACRYPT'03, Taipei, Taiwan, 2003; 452-473.
-
(2003)
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
3
-
-
84876300178
-
-
Malicious KGC attacks in certificateless cryptography, In ACM ASIACCS'07, Singapore
-
Au MH, Chen J, Liu JK, Mu Y, Wong DS, Yang G. Malicious KGC attacks in certificateless cryptography, In ACM ASIACCS'07, Singapore, 2007; 302-311.
-
(2007)
, pp. 302-311
-
-
Au, M.H.1
Chen, J.2
Liu, J.K.3
Mu, Y.4
Wong, D.S.5
Yang, G.6
-
4
-
-
33744786523
-
-
On the security of certificateless signature schemes from Asiacrypt 2003, In Proceedings of CANS 2005, Xiamen, China
-
Huang X, Susilo W, Mu Y, Zhang F. On the security of certificateless signature schemes from Asiacrypt 2003, In Proceedings of CANS 2005, Xiamen, China, 2005; 13-25.
-
(2005)
, pp. 13-25
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
5
-
-
35048832495
-
-
Generic construction of certificateless signature, In Proceedings of ACISP 2004, Sydney, Australia
-
Yum DH, Lee PJ. Generic construction of certificateless signature, In Proceedings of ACISP 2004, Sydney, Australia, 2004; 200-211.
-
(2004)
, pp. 200-211
-
-
Yum, D.H.1
Lee, P.J.2
-
6
-
-
33746370456
-
-
Key replacement attack against a generic construction of certificateless signature, In Proceedings of ACISP 2006, Melbourne, Australia
-
Hu BC, Wong DS, Zhang Z, Deng X. Key replacement attack against a generic construction of certificateless signature, In Proceedings of ACISP 2006, Melbourne, Australia, 2006; 235-246.
-
(2006)
, pp. 235-246
-
-
Hu, B.C.1
Wong, D.S.2
Zhang, Z.3
Deng, X.4
-
7
-
-
33846219987
-
Certificateless signature: a new security model and an improved generic construction
-
Hu BC, Wong DS, Zhang Z, Deng X. Certificateless signature: a new security model and an improved generic construction. Designs, Codes and Cryptography 2007; 42(2): 109-126.
-
(2007)
Designs, Codes and Cryptography
, vol.42
, Issue.2
, pp. 109-126
-
-
Hu, B.C.1
Wong, D.S.2
Zhang, Z.3
Deng, X.4
-
8
-
-
38149080541
-
-
Certificateless signature revisited, In Proceedings of ACISP 2007, Townsville, Australia
-
Huang X, Mu Y, Susilo W, Wong DS, Wu W. Certificateless signature revisited, In Proceedings of ACISP 2007, Townsville, Australia, 2007; 308-322.
-
(2007)
, pp. 308-322
-
-
Huang, X.1
Mu, Y.2
Susilo, W.3
Wong, D.S.4
Wu, W.5
-
9
-
-
84876341103
-
-
Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model, In ACM ASIACCS'07, Singapore
-
Liu JK, Au MH, Susilo W. Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model, In ACM ASIACCS'07, Singapore, 2007; 273-283.
-
(2007)
, pp. 273-283
-
-
Liu, J.K.1
Au, M.H.2
Susilo, W.3
-
10
-
-
53449097686
-
Dent, a survey of certificateless encryption schemes and security models
-
Alexander W. Dent, a survey of certificateless encryption schemes and security models. International Journal of Information Security 2008; 7(5): 349-377.
-
(2008)
International Journal of Information Security
, vol.7
, Issue.5
, pp. 349-377
-
-
Alexander, W.1
-
12
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
Shor P. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal of Computing 1997; 26: 1484-1509.
-
(1997)
SIAM Journal of Computing
, vol.26
, pp. 1484-1509
-
-
Shor, P.1
-
13
-
-
70350642078
-
-
Public-key cryptosystems from the worst-case shortest vector problem, In STOC'09, Maryland, US
-
Peikert C. Public-key cryptosystems from the worst-case shortest vector problem, In STOC'09, Maryland, US, 2009; 333-342.
-
(2009)
, pp. 333-342
-
-
Peikert, C.1
-
14
-
-
70349309809
-
On lattices, learning with errors, random linear codes, and cryptography
-
Regev O. On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM 2009; 56(6): 34.1-34.40.
-
(2009)
Journal of the ACM
, vol.56
, Issue.6
, pp. 341-3440
-
-
Regev, O.1
-
15
-
-
77957015647
-
-
Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE, In Advanced in Cryptology - CRYPTO 2010, Santa Barbara, CA, USA
-
Agrawal S, Boneh D, Boyen X. Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE, In Advanced in Cryptology - CRYPTO 2010, Santa Barbara, CA, USA, 2010; 98-115.
-
(2010)
, pp. 98-115
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
16
-
-
77954625601
-
-
Efficient lattice (H)IBE in the standard model, In Advanced in Cryptology - EUROCRYPT 2010, French Riviera
-
Agrawal S, Boneh D, Boyen X. Efficient lattice (H)IBE in the standard model, In Advanced in Cryptology - EUROCRYPT 2010, French Riviera, 2010; 553-572.
-
(2010)
, pp. 553-572
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
17
-
-
77954654490
-
-
Bonsai trees, or how to delegate a lattice basis, In Proceedings of Eurocrypt 2010, French Riviera
-
Cash D, Hofheinz D, Kiltz E, Peikert C. Bonsai trees, or how to delegate a lattice basis, In Proceedings of Eurocrypt 2010, French Riviera, 2010; 523-552.
-
(2010)
, pp. 523-552
-
-
Cash, D.1
Hofheinz, D.2
Kiltz, E.3
Peikert, C.4
-
18
-
-
51849137205
-
-
Trapdoors for hard lattices and new cryptographic constructions, In STOC, Victoria, BC, Canada
-
Gentry C, Peikert C, Vaikuntanathan V. Trapdoors for hard lattices and new cryptographic constructions, In STOC, Victoria, BC, Canada, 2008; 197-206.
-
(2008)
, pp. 197-206
-
-
Gentry, C.1
Peikert, C.2
Vaikuntanathan, V.3
-
19
-
-
77954421317
-
-
Strongly unforgeable signatures and hierarchical identity-based signatures from lattices without random oracles, In PQCrypto'10, Darmstadt, Germany
-
Rückert M. Strongly unforgeable signatures and hierarchical identity-based signatures from lattices without random oracles, In PQCrypto'10, Darmstadt, Germany, 2010; 182-200.
-
(2010)
, pp. 182-200
-
-
Rückert, M.1
-
20
-
-
38749097694
-
Worst-case to average-case reductions based on Gaussian measures
-
Micciancio D, Regev O. Worst-case to average-case reductions based on Gaussian measures. In SIAM Journal on Computing (SICOMP) 2007; 37(1): 267-302.
-
(2007)
In SIAM Journal on Computing (SICOMP)
, vol.37
, Issue.1
, pp. 267-302
-
-
Micciancio, D.1
Regev, O.2
-
21
-
-
0029719917
-
-
Generating hard instance of lattice problems, In STOC, Philadelphia, Pennsylvania, USA
-
Ajtai M. Generating hard instance of lattice problems, In STOC, Philadelphia, Pennsylvania, USA, 1996; 99-108.
-
(1996)
, pp. 99-108
-
-
Ajtai, M.1
-
22
-
-
84880234544
-
-
Generating shorter bases for hard random lattices, In STACS, Freiburg, Germany
-
Alwen J, Peikert C. Generating shorter bases for hard random lattices, In STACS, Freiburg, Germany, 2009; 75-86.
-
(2009)
, pp. 75-86
-
-
Alwen, J.1
Peikert, C.2
|