-
1
-
-
0345490607
-
-
Springer, LNCS, Taipei, Taiwan
-
Al-Riyami SS, Paterson K. Certificateless Public Key Cryptography, 2894. Springer, LNCS: Taipei, Taiwan, 2003; 452–473.
-
(2003)
Certificateless Public Key Cryptography
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.2
-
2
-
-
33744786523
-
-
Springer, LNCS, Xiamen, China
-
Huang X, Susilo W, Mu Y, Zhang F. On the Security of Certificateless Signature Schemes from Asiacrypt 2003, 3810. Springer, LNCS: Xiamen, China, 2005; 13–25.
-
(2005)
On the Security of Certificateless Signature Schemes from Asiacrypt 2003
, vol.3810
, pp. 13-25
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
3
-
-
33746591632
-
-
Springer, LNCS, Singapore
-
Zhang Z, Wong D. Certificateless Public-Key Signature: Security Model and Efficient Construction, 3989. Springer, LNCS: Singapore, 2006; 293–308.
-
(2006)
Certificateless Public-Key Signature: Security Model and Efficient Construction
, vol.3989
, pp. 293-308
-
-
Zhang, Z.1
Wong, D.2
-
4
-
-
33646852592
-
-
Springer-Verlag, LNAI, Xi'an, China
-
Gorantla MC, Saxena A. An Efficient Certificateless Signature Scheme, 3802. Springer-Verlag, LNAI: Xi'an, China, 2005; 110–116.
-
(2005)
An Efficient Certificateless Signature Scheme
, vol.3802
, pp. 110-116
-
-
Gorantla, M.C.1
Saxena, A.2
-
6
-
-
62849086420
-
Design of DL-based certificateless digital signatures
-
Ham L, Ren J, Lin CL. Design of DL-based certificateless digital signatures. Journal of Systems and Software 2009; 82(5): 789–793.
-
(2009)
Journal of Systems and Software
, vol.82
, Issue.5
, pp. 789-793
-
-
Ham, L.1
Ren, J.2
Lin, C.L.3
-
7
-
-
38149080541
-
-
LNCS, Townsville, Australia
-
Huang X, Mu Y, Susilo W, Wong DS, Wu W. Certificateless Signature Revisited, 4586. LNCS: Townsville, Australia, 2007; 308–322.
-
(2007)
Certificateless Signature Revisited
, vol.4586
, pp. 308-322
-
-
Huang, X.1
Mu, Y.2
Susilo, W.3
Wong, D.S.4
Wu, W.5
-
9
-
-
84865366436
-
An efficient and provably-secure certificateless signature scheme without bilinear pairings
-
He D, Chen J, Zhang R. An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems 2011; 25(11): 1432–1442.
-
(2011)
International Journal of Communication Systems
, vol.25
, Issue.11
, pp. 1432-1442
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
10
-
-
84886592290
-
Cryptanalysis of a certificateless signature scheme without pairings
-
Tian MM, Huang LS. Cryptanalysis of a certificateless signature scheme without pairings. International Journal of Communication Systems 2013; 26(11): 1375–1381.
-
(2013)
International Journal of Communication Systems
, vol.26
, Issue.11
, pp. 1375-1381
-
-
Tian, M.M.1
Huang, L.S.2
-
11
-
-
84904406563
-
Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings
-
Tsai JL, Lo NW, Wu TC. Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings. International Journal of Communication Systems 2014; 27(7): 1083–1090.
-
(2014)
International Journal of Communication Systems
, vol.27
, Issue.7
, pp. 1083-1090
-
-
Tsai, J.L.1
Lo, N.W.2
Wu, T.C.3
-
12
-
-
84911991530
-
Further improvement of a certificateless signature scheme without pairing
-
Gong P, Li P. Further improvement of a certificateless signature scheme without pairing. International Journal of Communication Systems 2014; 27(10): 2083–2091.
-
(2014)
International Journal of Communication Systems
, vol.27
, Issue.10
, pp. 2083-2091
-
-
Gong, P.1
Li, P.2
-
14
-
-
84889032245
-
Secure certificateless signature scheme supporting batch verification
-
Fan CI, Ho PH, Huang JJ, Tseng YF. Secure certificateless signature scheme supporting batch verification. Information Security (Asia JCIS), 2013 Eighth Asia Joint Conference on IEEE, 2013; 8–11.
-
(2013)
Information Security (Asia JCIS), 2013 Eighth Asia Joint Conference on IEEE
, pp. 8-11
-
-
Fan, C.I.1
Ho, P.H.2
Huang, J.J.3
Tseng, Y.F.4
-
15
-
-
84922998373
-
A new certificateless signature scheme under enhanced security models
-
Kim KS, Jeong IR. A new certificateless signature scheme under enhanced security models. Security and Communication Networks 2014. DOI:10.1002/sec.1036.
-
(2014)
Security and Communication Networks
-
-
Kim, K.S.1
Jeong, I.R.2
-
18
-
-
24944566040
-
Efficient identity based encryption without random oracles
-
In, LNCS, Aarhus, Denmark
-
Waters B. Efficient identity based encryption without random oracles. In Advances in Cryptology-EUROCRYPT 2005, 3494. LNCS: Aarhus, Denmark, 2005; 114–127.
-
(2005)
Advances in Cryptology-EUROCRYPT 2005
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
19
-
-
38149074788
-
-
Springer, Heidelberg, LNCS, Nara, Japan
-
Huang Q, Wong DS. Generic Certificateless Encryption in the Standard Model, 4752. Springer, Heidelberg, LNCS: Nara, Japan, 2007; 278–291.
-
(2007)
Generic Certificateless Encryption in the Standard Model
, vol.4752
, pp. 278-291
-
-
Huang, Q.1
Wong, D.S.2
-
20
-
-
58149512474
-
An Improved Certificateless Signature Scheme Secure in the Standard Model
-
Xiong H, Qin Z, Li F. An Improved Certificateless Signature Scheme Secure in the Standard Model, 88. Fundamenta Informaticae, 2008; 193–206.
-
(2008)
Fundamenta Informaticae
, vol.88
, pp. 193-206
-
-
Xiong, H.1
Qin, Z.2
Li, F.3
-
21
-
-
70350648522
-
-
Springer-Verlag, LNCS, Seoul, Korea
-
Yuan Y, Li D, Tian L, Zhu H. Certificateless Signature Scheme without Random Oracles, 5576. Springer-Verlag, LNCS: Seoul, Korea, 2009; 31–40.
-
(2009)
Certificateless Signature Scheme without Random Oracles
, vol.5576
, pp. 31-40
-
-
Yuan, Y.1
Li, D.2
Tian, L.3
Zhu, H.4
-
22
-
-
77955436425
-
Key replacement attack on two certificateless signature schemes without random oracles
-
Xia Q, Xu CX, Yu Y. Key replacement attack on two certificateless signature schemes without random oracles. Key Engineering Materials 2010; 439-440: 1606–1611.
-
(2010)
Key Engineering Materials
, vol.439-440
, pp. 1606-1611
-
-
Xia, Q.1
Xu, C.X.2
Yu, Y.3
-
23
-
-
84863572750
-
Improved certificateless signature scheme provably secure in the standard model
-
Yu Y, Mu Y, Wang G, Xia Q, Yang B. Improved certificateless signature scheme provably secure in the standard model. IET Information Security 2012; 6(2): 102–110.
-
(2012)
IET Information Security
, vol.6
, Issue.2
, pp. 102-110
-
-
Yu, Y.1
Mu, Y.2
Wang, G.3
Xia, Q.4
Yang, B.5
-
25
-
-
84937570422
-
Self-certified public keys
-
In, Davies DW, (ed.)., Springer, LNCS, Brighton, UK
-
Girault M. Self-certified public keys. In EUROCRYPT 1991, Davies DW (ed.). Springer, LNCS: Brighton, UK, 1992, vol. 547; 490–497.
-
(1992)
EUROCRYPT 1991
, vol.547
, pp. 490-497
-
-
Girault, M.1
-
26
-
-
33746370456
-
-
Springer, LNCS, Melbourne, Australia
-
Hu BC, Wong DS, Zhang Z, Deng X. Key Replacement Attack against a Generic Construction of Certificateless Signature, 4058. Springer, LNCS: Melbourne, Australia, 2006; 235–246.
-
(2006)
Key Replacement Attack against a Generic Construction of Certificateless Signature
, vol.4058
, pp. 235-246
-
-
Hu, B.C.1
Wong, D.S.2
Zhang, Z.3
Deng, X.4
-
27
-
-
84876300178
-
Malicious KGC attack in certificateless cryptography
-
Au MH, Chen J, Liu JK, Mu Y, Wong DS, Yang G. Malicious KGC attack in certificateless cryptography. In: Proc. ACM Symposium on Information, Computer and Communications Security, 2007; 302–311.
-
(2007)
Proc. ACM Symposium on Information, Computer and Communications Security
, pp. 302-311
-
-
Au, M.H.1
Chen, J.2
Liu, J.K.3
Mu, Y.4
Wong, D.S.5
Yang, G.6
-
28
-
-
85032873931
-
Efficient identifications and signatures for smart cards
-
In, Springer-Verlag, LNCS, Belgium
-
Schnorr CP. Efficient identifications and signatures for smart cards. In Crypto'89, 434. Springer-Verlag, LNCS: Belgium, 1990; 688–689.
-
(1990)
Crypto'89
, vol.434
, pp. 688-689
-
-
Schnorr, C.P.1
|