Public Key Cryptography – PKC 2004
From MaRDI portal
Publication:5901807
DOI10.1007/b95631zbMath1198.94079OpenAlexW2482419090MaRDI QIDQ5901807
Publication date: 14 May 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b95631
Related Items (21)
A new ring signature scheme with signer-admission property ⋮ Reducing elliptic curve logarithms to logarithms in a finite field ⋮ Certificateless threshold signature scheme from bilinear maps ⋮ Identity-based threshold decryption on access structure ⋮ Efficient dynamic threshold identity-based encryption with constant-size ciphertext ⋮ Identity-based chameleon hashing and signatures without key exposure ⋮ Group-oriented setting's multisigncryption scheme with threshold designcryption ⋮ Efficient identity-based threshold decryption scheme from bilinear pairings ⋮ (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance ⋮ Provably secure threshold public-key encryption with adaptive security and short ciphertexts ⋮ An ID-based signcryption scheme with compartmented secret sharing for unsigncryption ⋮ Certificateless threshold signature secure in the standard model ⋮ Certificateless threshold cryptosystem secure against chosen-ciphertext attack ⋮ All-in-one group-oriented cryptosystem based on bilinear pairing ⋮ Certificateless undeniable signature scheme ⋮ Indifferentiable deterministic hashing to elliptic and hyperelliptic curves ⋮ Revocable Identity-Based Encryption Revisited: Security Model and Construction ⋮ Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism ⋮ Adaptive-ID Secure Revocable Identity-Based Encryption ⋮ Still wrong use of pairings in cryptography ⋮ On Dynamic Distribution of Private Keys over MANETs
This page was built for publication: Public Key Cryptography – PKC 2004