Information Security

From MaRDI portal
Revision as of 04:05, 7 March 2024 by Import240305080351 (talk | contribs) (Created automatically from import240305080351)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5493164

DOI10.1007/11556992zbMath1127.94358OpenAlexW4241272628MaRDI QIDQ5493164

Joonsang Baek, Willy Susilo, Reihaneh Safavi-Naini

Publication date: 20 October 2006

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11556992




Related Items (26)

A more efficient accountable authority IBE scheme under the DL assumptionProvably secure certificateless proxy signature scheme in the standard modelLattice-based certificateless encryption schemePrivacy-preserving file sharing on cloud storage with certificateless signcryptionCertificateless Proxy Re-Encryption Without PairingsSimulatability and security of certificateless threshold signaturesAn efficient RSA-based certificateless public key encryption schemeCryptanalysis and improvement of a certificateless encryption scheme in the standard modelChosen-ciphertext secure bidirectional proxy re-encryption schemes without pairingsCryptanalysis of a certificateless signcryption scheme in the standard modelCertificateless encryption scheme with provable security in the standard model suitable for mobile devicesCertificateless public key encryption: a new generic construction and two pairing-free schemesCertificateless Public Key Signature Schemes from Standard AlgorithmsProvably secure certificate-based signature scheme without pairingsGeneral Certificateless Encryption and Timed-Release EncryptionNew Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard ModelSelf-generated-certificate public key encryption without pairing and its applicationEfficient certificateless threshold signatures without random oraclesCertificateless cryptography with KGC trust level 3An improved certificateless strong key-insulated signature scheme in the standard modelStrongly Secure Certificateless Public Key Encryption Without PairingDistributed key generation for SM9-based systemsA Schnorr-Like Lightweight Identity-Based Signature SchemeCertified Encryption RevisitedAnonymous certificateless multi-receiver encryption scheme for smart community management systemsChosen-Ciphertext Secure Proxy Re-encryption without Pairings




This page was built for publication: Information Security