Provable certificateless generalized signcryption scheme (Q2448080): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s10623-012-9734-y / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2119360243 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Cryptosystems and Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - ASIACRYPT 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364550 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An efficient identity based generalized signcryption scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Provable secure identity based generalized signcryption scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3518418 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3601892 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of a certificateless signcryption scheme in the standard model / rank
 
Normal rank

Latest revision as of 11:50, 8 July 2024

scientific article
Language Label Description Also known as
English
Provable certificateless generalized signcryption scheme
scientific article

    Statements

    Provable certificateless generalized signcryption scheme (English)
    0 references
    0 references
    0 references
    0 references
    29 April 2014
    0 references
    0 references
    certificateless generalized signcryption
    0 references
    malicious-but-passive KGC attacks
    0 references
    gap bilinear Diffie-Hellman assumption
    0 references
    computational Diffie-Hellman assumption
    0 references
    random oracle model
    0 references
    0 references