Advances in Cryptology - ASIACRYPT 2003

From MaRDI portal
Revision as of 06:23, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5902399

DOI10.1007/B94617zbMath1205.94072OpenAlexW2899867281MaRDI QIDQ5902399

Kenneth G. Paterson, Sattam S. al-Riyami

Publication date: 5 January 2010

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b94617




Related Items (only showing first 100 items - show all)

Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairingEfficient three-party authenticated key agreement protocol in certificateless cryptographyOn CCA-Secure Somewhat Homomorphic EncryptionRegistration-based encryption: removing private-key generator from IBEProvably secure certificateless proxy signature scheme in the standard modelLattice-based certificateless encryption schemePrivacy-preserving file sharing on cloud storage with certificateless signcryptionCertificateless signcryption scheme in the standard modelSecure and efficient protection of consumer privacy in advanced metering infrastructure supporting fine-grained data analysisCertificateless signature: a new security model and an improved generic constructionOptimizing registration based encryptionSurvey of information securityCertificateless ring signature based on RSA problem and DL problemAn Efficient and Provably Secure Certificate-Based Encryption SchemeSimulatability and security of certificateless threshold signaturesCertificate-based signcryption with enhanced security featuresAn efficient certificateless two-party authenticated key agreement protocolPrivacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisitedAccountable identity-based encryption with distributed private key generatorsA query privacy-enhanced and secure search scheme over encrypted data in cloud computingCertificateless aggregate signature scheme secure against fully chosen-key attacksForgery attacks on two provably secure certificateless signature schemesLeakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairingAn efficient RSA-based certificateless public key encryption schemeDistributed certificateless key encapsulation mechanism secure against the adaptive adversaryAn improved ring signature scheme without trusted key generation center for wireless sensor networkProvably secure and efficient certificateless authenticated tripartite key agreement protocolA novel pairing-free certificateless authenticated key agreement protocol with provable securityCryptanalysis and improvement of a certificateless encryption scheme in the standard modelKCI-resilient anonymous wireless link-layer authentication protocolsA short non-delegatable strong designated verifier signatureCertificateless key-insulated signature without random oraclesCertificateless threshold signature scheme from bilinear mapsCryptanalysis of a certificateless signcryption scheme in the standard modelCertificateless strong key-insulated signature without random oraclesCertificateless message recovery signatures providing Girault's level-3 securityA new two-round certificateless authenticated key agreement protocol without bilinear pairingsGeneric constructions of identity-based and certificateless kEMsA pairing-free and provably secure certificateless signature schemeAn efficient certificateless aggregate signature without pairings for vehicular ad hoc networksCertificateless public key encryption: a new generic construction and two pairing-free schemesCertificateless public key encryption with equality testProvably secure certificate-based encryption with leakage resilienceDelegation of signing rights using certificateless proxy signaturesProvably secure certificate-based proxy blind signature scheme from pairingsA new certificateless multiple key agreement schemeA new provably secure certificateless short signature schemeAn anonymous authentication scheme in VANETs of smart city based on certificateless group signatureEfficient certificateless proxy signature scheme with provable securityUnrestricted and compact certificateless aggregate signature schemeCertificateless proxy signature from RSAStrongly secure certificateless signature scheme supporting batch verificationProvably secure certificate-based signature scheme without pairingsCertificateless public key encryption scheme with hybrid problems and its application to Internet of thingsEfficient certificateless anonymous multi-receiver encryption scheme without bilinear paringsCryptanalysis and improvement of three certificateless aggregate signature schemesProvable certificateless generalized signcryption schemeCertificateless signature scheme with security enhanced in the standard modelAn efficient certificateless proxy signature scheme without pairingSecure and efficient delegation of elliptic-curve pairingPrivacy-preserving certificateless provable data possession scheme for big data storage on cloudCertificateless threshold signature secure in the standard modelCryptanalysis and improvement of a certificateless threshold signature secure in the standard modelCertificateless threshold cryptosystem secure against chosen-ciphertext attackCertificateless undeniable signature schemeNotes on the security of certificateless aggregate signature schemesCertificateless one-pass and two-party authenticated key agreement protocol and its extensionsAn efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networksA provable authenticated group key agreement protocol for mobile environmentA certificateless ring signature scheme with high efficiency in the random oracle modelCryptanalysis and improvement of a certificateless aggregate signature schemeSecurity models for certificateless signature schemes revisitedSelf-generated-certificate public key encryption without pairing and its applicationEfficient certificateless threshold signatures without random oraclesSimulatable certificateless two-party authenticated key agreement protocolEfficient chosen-ciphertext secure certificateless threshold key encapsulation mechanismCertificateless undeniable signatures from bilinear mapsCertificateless cryptography with KGC trust level 3Security of self-certified signaturesPitfalls in a server-aided authenticated group key establishmentEscrow free attribute-based signature with self-revealabilityComment on a certificateless one-pass and two-party authenticated key agreement protocolA provably secure certificate-based encryption scheme against malicious CA attacks in the standard modelCertificate-free \textit{ad hoc} anonymous authenticationSignatures in hierarchical certificateless cryptography: efficient constructions and provable securityCertificateless proxy multi-signatureCertificateless threshold ring signatureCryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairingAn improved certificateless strong key-insulated signature scheme in the standard modelBreaking the short certificateless signature schemeCertificateless two-party authenticated key agreement scheme for smart gridEfficient Completely Non-Malleable and RKA Secure Public Key EncryptionsDistributed key generation for SM9-based systemsIdentity-based encryption with security against the KGC: a formal model and its instantiationsAnonymous certificateless multi-receiver encryption scheme for smart community management systemsBlack-box constructions of signature schemes in the bounded leakage settingLattice-based revocable certificateless signatureCertificateless signature and proxy signature schemes from bilinear pairingsVerifiable registration-based encryptionAn efficient certificate-based signature scheme in the standard model







This page was built for publication: Advances in Cryptology - ASIACRYPT 2003