On the security of joint signature and encryption revisited
From MaRDI portal
Publication:350517
DOI10.1515/jmc-2015-0060zbMath1384.94091OpenAlexW2555461682WikidataQ123159868 ScholiaQ123159868MaRDI QIDQ350517
Publication date: 7 December 2016
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/jmc-2015-0060
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Verifiability-based conversion from CPA to CCA-secure predicate encryption
- Dynamic attribute-based signcryption without random oracles
- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
- Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack
- Attribute-Based Signatures
- Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
- Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing
- Confidential Signatures and Deterministic Signcryption
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Threshold Attribute-Based Signcryption
- Generic Transformation to Strongly Unforgeable Signatures
- Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- Efficient Constructions of Signcryption Schemes and Signcryption Composability
- Foundations of Cryptography
- Communication in key distribution schemes
- Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model
- Combined Public-Key Schemes: The Case of ABE and ABS
- Fuzzy Identity-Based Encryption
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Advances in Cryptology - CRYPTO 2003
- Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
- Security in Communication Networks
- Public Key Cryptography - PKC 2005
- Theory of Cryptography
This page was built for publication: On the security of joint signature and encryption revisited