The following pages link to (Q4413870):
Displaying 50 items.
- Combined schemes for signature and encryption: the public-key and the identity-based setting (Q259033) (← links)
- On the security of two identity-based signature schemes based on pairings (Q264198) (← links)
- A provable secure fuzzy identity based signature scheme (Q362302) (← links)
- An improved two-party identity-based authenticated key agreement protocol using pairings (Q414861) (← links)
- Creation of identity-based digital signature schemes from bilinear maps (Q466389) (← links)
- Simplified small exponent test for batch verification (Q501674) (← links)
- Forward-secure identity-based signature: security notions and construction (Q621647) (← links)
- Identity-based trapdoor mercurial commitments and applications (Q719291) (← links)
- An identity-based strongly unforgeable signature without random oracles from bilinear pairings (Q726463) (← links)
- Attribute-based key-insulated signature and its applications (Q726546) (← links)
- Black-box constructions of signature schemes in the bounded leakage setting (Q781055) (← links)
- Identity-based chameleon hashing and signatures without key exposure (Q903661) (← links)
- A new framework for the design and analysis of identity-based identification schemes (Q955014) (← links)
- Security proofs for identity-based identification and signature schemes (Q1027974) (← links)
- An efficient online/offline ID-based short signature procedure using extended chaotic maps (Q2001147) (← links)
- A secure cross-chain transaction model based on quantum multi-signature (Q2101577) (← links)
- Efficient traceable ring signature scheme without pairings (Q2176288) (← links)
- Forward-secure ID based digital signature scheme with forward-secure private key generator (Q2195298) (← links)
- Secure and efficient delegation of elliptic-curve pairing (Q2229264) (← links)
- Identity-based signatures in standard model (Q2317833) (← links)
- Security weaknesses of a signature scheme and authenticated key agreement protocols (Q2445398) (← links)
- Certificateless undeniable signature scheme (Q2466071) (← links)
- Provably secure non-interactive key distribution based on pairings (Q2489921) (← links)
- Secure administration of cryptographic role-based access control for large-scale cloud storage systems (Q2509592) (← links)
- Certificateless signature and proxy signature schemes from bilinear pairings (Q2571514) (← links)
- Identity based group-oriented undeniable signature scheme (Q2571991) (← links)
- ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings (Q2572349) (← links)
- LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication (Q2630799) (← links)
- Linearly homomorphic signatures with designated combiner (Q2697930) (← links)
- One-Round Attribute-Based Key Exchange in the Multi-party Setting (Q2953862) (← links)
- Traceable Identity-Based Group Signature (Q2956880) (← links)
- Authenticated Group Key Agreement Protocol Without Pairing (Q3297534) (← links)
- Identity Based Group Signatures from Hierarchical Identity-Based Encryption (Q3392909) (← links)
- Improvement of identity-based threshold proxy signature scheme with known signers (Q3443248) (← links)
- A Provably Secure Ring Signature Scheme in Certificateless Cryptography (Q3503873) (← links)
- An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model (Q3506348) (← links)
- An Efficient ID-Based Proxy Signature Scheme from Pairings (Q3600319) (← links)
- Hash Functions from Sigma Protocols and Improvements to VSH (Q3600369) (← links)
- Practical Short Signature Batch Verification (Q3623054) (← links)
- A Schnorr-Like Lightweight Identity-Based Signature Scheme (Q3637136) (← links)
- A conference key distribution system (Q3950456) (← links)
- One-Round Attribute-Based Key Exchange in the Multi-Party Setting (Q4605648) (← links)
- Formal Language Identity-based Cryptography (Q5025958) (← links)
- A strongly secure identity-based authenticated group key exchange protocol (Q5046475) (← links)
- Digital Signatures (Q5050199) (← links)
- Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves (Q5069714) (← links)
- Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption (Q5233839) (← links)
- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures (Q5445450) (← links)
- Proxy Signatures Secure Against Proxy Key Exposure (Q5445451) (← links)
- Multi-key Hierarchical Identity-Based Signatures (Q5448550) (← links)