Combined schemes for signature and encryption: the public-key and the identity-based setting
From MaRDI portal
Publication:259033
DOI10.1016/J.IC.2015.11.001zbMath1403.94059OpenAlexW2188482023WikidataQ123300350 ScholiaQ123300350MaRDI QIDQ259033
María Isabel González Vasco, Florian Hess, Rainer Steinwandt
Publication date: 10 March 2016
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ic.2015.11.001
Related Items (2)
Certificate-Based Generalized Ring Signcryption Scheme ⋮ Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Efficient selective identity-based encryption without random oracles
- Security arguments for digital signatures and blind signatures
- Short signatures without random oracles and the SDH assumption in bilinear groups
- Security Proofs for Signature Schemes
- On the Joint Security of Encryption and Signature in EMV
- On the Joint Security of Encryption and Signature, Revisited
- Optimal Asymmetric Encryption and Signature Paddings
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Identity-Based Encryption from the Weil Pairing
- Secure integration of asymmetric and symmetric encryption schemes
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - CRYPTO 2003
- Automata, Languages and Programming
This page was built for publication: Combined schemes for signature and encryption: the public-key and the identity-based setting