scientific article; zbMATH DE number 1951619

From MaRDI portal
Revision as of 02:36, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4413870

zbMath1066.94554MaRDI QIDQ4413870

Florian Hess

Publication date: 21 July 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2595/25950310.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (55)

On the security of two identity-based signature schemes based on pairingsImprovement of identity-based threshold proxy signature scheme with known signersA strongly secure identity-based authenticated group key exchange protocolLESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communicationEfficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic CurvesA provable secure fuzzy identity based signature schemeEfficient traceable ring signature scheme without pairingsOne-Round Attribute-Based Key Exchange in the Multi-party SettingForward-secure identity-based signature: security notions and constructionA Provably Secure Ring Signature Scheme in Certificateless CryptographyTraceable Identity-Based Group SignatureAn Efficient and Provable Secure Identity-Based Identification Scheme in the Standard ModelAn improved two-party identity-based authenticated key agreement protocol using pairingsForward-secure ID based digital signature scheme with forward-secure private key generatorIdentity-based signature and extended forking algorithm in the multivariate quadratic settingIdentity-based chameleon hashing and signatures without key exposureOne-Round Attribute-Based Key Exchange in the Multi-Party SettingLinearly homomorphic signatures with designated combinerSecurity weaknesses of a signature scheme and authenticated key agreement protocolsCreation of identity-based digital signature schemes from bilinear mapsAuthenticated Group Key Agreement Protocol Without PairingSecure and efficient delegation of elliptic-curve pairingSimplified small exponent test for batch verificationCertificateless undeniable signature schemeA new framework for the design and analysis of identity-based identification schemesAn efficient online/offline ID-based short signature procedure using extended chaotic mapsProvably secure non-interactive key distribution based on pairingsAn Efficient ID-Based Proxy Signature Scheme from PairingsHash Functions from Sigma Protocols and Improvements to VSHIdentity-based trapdoor mercurial commitments and applicationsConstruction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard SignaturesProxy Signatures Secure Against Proxy Key ExposureAn identity-based strongly unforgeable signature without random oracles from bilinear pairingsAttribute-based key-insulated signature and its applicationsMulti-key Hierarchical Identity-Based SignaturesSecure administration of cryptographic role-based access control for large-scale cloud storage systemsMutative Identity-Based Signatures or Dynamic Credentials Without Random OraclesPractical Short Signature Batch VerificationA Schnorr-Like Lightweight Identity-Based Signature SchemeIdentity Based Group Signatures from Hierarchical Identity-Based EncryptionSecurity proofs for identity-based identification and signature schemesIdentity-Based Combined Public Key Schemes for Signature, Encryption, and SigncryptionIdentity-based signatures in standard modelBlack-box constructions of signature schemes in the bounded leakage settingOn the Security of Online/Offline Signatures and Multisignatures from ACISP’06Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic GroupsThe Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure VersionCertificateless signature and proxy signature schemes from bilinear pairingsIdentity based group-oriented undeniable signature schemeID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairingsDigital SignaturesA secure cross-chain transaction model based on quantum multi-signatureA conference key distribution systemFormal Language Identity-based CryptographyCombined schemes for signature and encryption: the public-key and the identity-based setting







This page was built for publication: