scientific article; zbMATH DE number 1951619
From MaRDI portal
Publication:4413870
zbMath1066.94554MaRDI QIDQ4413870
Publication date: 21 July 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2595/25950310.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Tate pairingWeil pairingsupersingular elliptic curvessignature schemekey escrowidentity based signatures
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Applications to coding theory and cryptography of arithmetic geometry (14G50) Authentication, digital signatures and secret sharing (94A62)
Related Items (55)
On the security of two identity-based signature schemes based on pairings ⋮ Improvement of identity-based threshold proxy signature scheme with known signers ⋮ A strongly secure identity-based authenticated group key exchange protocol ⋮ LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication ⋮ Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves ⋮ A provable secure fuzzy identity based signature scheme ⋮ Efficient traceable ring signature scheme without pairings ⋮ One-Round Attribute-Based Key Exchange in the Multi-party Setting ⋮ Forward-secure identity-based signature: security notions and construction ⋮ A Provably Secure Ring Signature Scheme in Certificateless Cryptography ⋮ Traceable Identity-Based Group Signature ⋮ An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model ⋮ An improved two-party identity-based authenticated key agreement protocol using pairings ⋮ Forward-secure ID based digital signature scheme with forward-secure private key generator ⋮ Identity-based signature and extended forking algorithm in the multivariate quadratic setting ⋮ Identity-based chameleon hashing and signatures without key exposure ⋮ One-Round Attribute-Based Key Exchange in the Multi-Party Setting ⋮ Linearly homomorphic signatures with designated combiner ⋮ Security weaknesses of a signature scheme and authenticated key agreement protocols ⋮ Creation of identity-based digital signature schemes from bilinear maps ⋮ Authenticated Group Key Agreement Protocol Without Pairing ⋮ Secure and efficient delegation of elliptic-curve pairing ⋮ Simplified small exponent test for batch verification ⋮ Certificateless undeniable signature scheme ⋮ A new framework for the design and analysis of identity-based identification schemes ⋮ An efficient online/offline ID-based short signature procedure using extended chaotic maps ⋮ Provably secure non-interactive key distribution based on pairings ⋮ An Efficient ID-Based Proxy Signature Scheme from Pairings ⋮ Hash Functions from Sigma Protocols and Improvements to VSH ⋮ Identity-based trapdoor mercurial commitments and applications ⋮ Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures ⋮ Proxy Signatures Secure Against Proxy Key Exposure ⋮ An identity-based strongly unforgeable signature without random oracles from bilinear pairings ⋮ Attribute-based key-insulated signature and its applications ⋮ Multi-key Hierarchical Identity-Based Signatures ⋮ Secure administration of cryptographic role-based access control for large-scale cloud storage systems ⋮ Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles ⋮ Practical Short Signature Batch Verification ⋮ A Schnorr-Like Lightweight Identity-Based Signature Scheme ⋮ Identity Based Group Signatures from Hierarchical Identity-Based Encryption ⋮ Security proofs for identity-based identification and signature schemes ⋮ Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption ⋮ Identity-based signatures in standard model ⋮ Black-box constructions of signature schemes in the bounded leakage setting ⋮ On the Security of Online/Offline Signatures and Multisignatures from ACISP’06 ⋮ Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups ⋮ The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version ⋮ Certificateless signature and proxy signature schemes from bilinear pairings ⋮ Identity based group-oriented undeniable signature scheme ⋮ ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings ⋮ Digital Signatures ⋮ A secure cross-chain transaction model based on quantum multi-signature ⋮ A conference key distribution system ⋮ Formal Language Identity-based Cryptography ⋮ Combined schemes for signature and encryption: the public-key and the identity-based setting
This page was built for publication: