scientific article; zbMATH DE number 2009961
From MaRDI portal
Publication:4434881
zbMath1037.68533MaRDI QIDQ4434881
Publication date: 26 November 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560272.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (41)
Efficient Certificate-Based Signature and Its Aggregation ⋮ An Efficient and Provably Secure Certificate-Based Encryption Scheme ⋮ Private Certificate-Based Remote Data Integrity Checking in Public Clouds ⋮ Certificate-based signcryption with enhanced security features ⋮ Accountable identity-based encryption with distributed private key generators ⋮ Efficient revocable identity-based encryption via subset difference methods ⋮ Adaptively secure certificate-based broadcast encryption and its application to cloud storage service ⋮ Unnamed Item ⋮ An improved ring signature scheme without trusted key generation center for wireless sensor network ⋮ Security weakness of a certificate-based proxy signature scheme for IIoT environments ⋮ Towards Certificate-Based Group Encryption ⋮ Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications ⋮ Generic constructions of identity-based and certificateless kEMs ⋮ Anonymous certificate-based broadcast encryption with constant decryption cost ⋮ Certificateless Public Key Signature Schemes from Standard Algorithms ⋮ Notes on a provably-secure certificate-based encryption against malicious CA attacks ⋮ Provably secure certificate-based encryption with leakage resilience ⋮ Provably secure certificate-based proxy blind signature scheme from pairings ⋮ Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters ⋮ Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme ⋮ (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance ⋮ Provably secure certificate-based signature scheme without pairings ⋮ Certificate-based verifiably encrypted signatures from pairings ⋮ Efficient Certificate-Based Encryption in the Standard Model ⋮ Certificate-Based Signature Schemes without Pairings or Random Oracles ⋮ Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments ⋮ Certificate-based proxy decryption systems with revocability in the standard model ⋮ Revocable Identity-Based Encryption Revisited: Security Model and Construction ⋮ Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing ⋮ Continuous leakage-resilient certificate-based encryption ⋮ Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures ⋮ A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model ⋮ Symmetric threshold multipath (STM): an online symmetric key management scheme ⋮ A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power ⋮ Certificate-Based Generalized Ring Signcryption Scheme ⋮ Asymmetric Group Key Agreement ⋮ Distributed key generation for SM9-based systems ⋮ Certified Encryption Revisited ⋮ Conjunctive Broadcast and Attribute-Based Encryption ⋮ Unnamed Item ⋮ An efficient certificate-based signature scheme in the standard model
This page was built for publication: