Advances in Cryptology - ASIACRYPT 2003
From MaRDI portal
Publication:5902399
DOI10.1007/B94617zbMath1205.94072OpenAlexW2899867281MaRDI QIDQ5902399
Kenneth G. Paterson, Sattam S. al-Riyami
Publication date: 5 January 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b94617
Related Items (only showing first 100 items - show all)
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing ⋮ Efficient three-party authenticated key agreement protocol in certificateless cryptography ⋮ On CCA-Secure Somewhat Homomorphic Encryption ⋮ Registration-based encryption: removing private-key generator from IBE ⋮ Provably secure certificateless proxy signature scheme in the standard model ⋮ Lattice-based certificateless encryption scheme ⋮ Privacy-preserving file sharing on cloud storage with certificateless signcryption ⋮ Certificateless signcryption scheme in the standard model ⋮ Secure and efficient protection of consumer privacy in advanced metering infrastructure supporting fine-grained data analysis ⋮ Certificateless signature: a new security model and an improved generic construction ⋮ Optimizing registration based encryption ⋮ Survey of information security ⋮ Certificateless ring signature based on RSA problem and DL problem ⋮ An Efficient and Provably Secure Certificate-Based Encryption Scheme ⋮ Simulatability and security of certificateless threshold signatures ⋮ Certificate-based signcryption with enhanced security features ⋮ An efficient certificateless two-party authenticated key agreement protocol ⋮ Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited ⋮ Accountable identity-based encryption with distributed private key generators ⋮ A query privacy-enhanced and secure search scheme over encrypted data in cloud computing ⋮ Certificateless aggregate signature scheme secure against fully chosen-key attacks ⋮ Forgery attacks on two provably secure certificateless signature schemes ⋮ Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing ⋮ An efficient RSA-based certificateless public key encryption scheme ⋮ Distributed certificateless key encapsulation mechanism secure against the adaptive adversary ⋮ An improved ring signature scheme without trusted key generation center for wireless sensor network ⋮ Provably secure and efficient certificateless authenticated tripartite key agreement protocol ⋮ A novel pairing-free certificateless authenticated key agreement protocol with provable security ⋮ Cryptanalysis and improvement of a certificateless encryption scheme in the standard model ⋮ KCI-resilient anonymous wireless link-layer authentication protocols ⋮ A short non-delegatable strong designated verifier signature ⋮ Certificateless key-insulated signature without random oracles ⋮ Certificateless threshold signature scheme from bilinear maps ⋮ Cryptanalysis of a certificateless signcryption scheme in the standard model ⋮ Certificateless strong key-insulated signature without random oracles ⋮ Certificateless message recovery signatures providing Girault's level-3 security ⋮ A new two-round certificateless authenticated key agreement protocol without bilinear pairings ⋮ Generic constructions of identity-based and certificateless kEMs ⋮ A pairing-free and provably secure certificateless signature scheme ⋮ An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks ⋮ Certificateless public key encryption: a new generic construction and two pairing-free schemes ⋮ Certificateless public key encryption with equality test ⋮ Provably secure certificate-based encryption with leakage resilience ⋮ Delegation of signing rights using certificateless proxy signatures ⋮ Provably secure certificate-based proxy blind signature scheme from pairings ⋮ A new certificateless multiple key agreement scheme ⋮ A new provably secure certificateless short signature scheme ⋮ An anonymous authentication scheme in VANETs of smart city based on certificateless group signature ⋮ Efficient certificateless proxy signature scheme with provable security ⋮ Unrestricted and compact certificateless aggregate signature scheme ⋮ Certificateless proxy signature from RSA ⋮ Strongly secure certificateless signature scheme supporting batch verification ⋮ Provably secure certificate-based signature scheme without pairings ⋮ Certificateless public key encryption scheme with hybrid problems and its application to Internet of things ⋮ Efficient certificateless anonymous multi-receiver encryption scheme without bilinear parings ⋮ Cryptanalysis and improvement of three certificateless aggregate signature schemes ⋮ Provable certificateless generalized signcryption scheme ⋮ Certificateless signature scheme with security enhanced in the standard model ⋮ An efficient certificateless proxy signature scheme without pairing ⋮ Secure and efficient delegation of elliptic-curve pairing ⋮ Privacy-preserving certificateless provable data possession scheme for big data storage on cloud ⋮ Certificateless threshold signature secure in the standard model ⋮ Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model ⋮ Certificateless threshold cryptosystem secure against chosen-ciphertext attack ⋮ Certificateless undeniable signature scheme ⋮ Notes on the security of certificateless aggregate signature schemes ⋮ Certificateless one-pass and two-party authenticated key agreement protocol and its extensions ⋮ An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks ⋮ A provable authenticated group key agreement protocol for mobile environment ⋮ A certificateless ring signature scheme with high efficiency in the random oracle model ⋮ Cryptanalysis and improvement of a certificateless aggregate signature scheme ⋮ Security models for certificateless signature schemes revisited ⋮ Self-generated-certificate public key encryption without pairing and its application ⋮ Efficient certificateless threshold signatures without random oracles ⋮ Simulatable certificateless two-party authenticated key agreement protocol ⋮ Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism ⋮ Certificateless undeniable signatures from bilinear maps ⋮ Certificateless cryptography with KGC trust level 3 ⋮ Security of self-certified signatures ⋮ Pitfalls in a server-aided authenticated group key establishment ⋮ Escrow free attribute-based signature with self-revealability ⋮ Comment on a certificateless one-pass and two-party authenticated key agreement protocol ⋮ A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model ⋮ Certificate-free \textit{ad hoc} anonymous authentication ⋮ Signatures in hierarchical certificateless cryptography: efficient constructions and provable security ⋮ Certificateless proxy multi-signature ⋮ Certificateless threshold ring signature ⋮ Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing ⋮ An improved certificateless strong key-insulated signature scheme in the standard model ⋮ Breaking the short certificateless signature scheme ⋮ Certificateless two-party authenticated key agreement scheme for smart grid ⋮ Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions ⋮ Distributed key generation for SM9-based systems ⋮ Identity-based encryption with security against the KGC: a formal model and its instantiations ⋮ Anonymous certificateless multi-receiver encryption scheme for smart community management systems ⋮ Black-box constructions of signature schemes in the bounded leakage setting ⋮ Lattice-based revocable certificateless signature ⋮ Certificateless signature and proxy signature schemes from bilinear pairings ⋮ Verifiable registration-based encryption ⋮ An efficient certificate-based signature scheme in the standard model
This page was built for publication: Advances in Cryptology - ASIACRYPT 2003