Information Security and Cryptology - ICISC 2003
From MaRDI portal
Publication:5714140
DOI10.1007/b96249zbMath1092.94505OpenAlexW2493429532MaRDI QIDQ5714140
Sherman S. M. Chow, Kam Pui Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui
Publication date: 27 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b96249
cryptographic primitivespublic key cryptosystemsnetwork securityprovable securityelliptic curve cryptosystemsfirewallssemantical securityforward securitypublic ciphertext authenticitypublic verifiabilityIdentity-based signcryption
Related Items (13)
Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey ⋮ Efficient proxy signcryption scheme with provable CCA and CMA security ⋮ Group-oriented setting's multisigncryption scheme with threshold designcryption ⋮ Identity-based aggregate signcryption in the standard model from multilinear maps ⋮ An efficient identity based generalized signcryption scheme ⋮ Secure identity-based signcryption in the standard model ⋮ An ID-based signcryption scheme with compartmented secret sharing for unsigncryption ⋮ Provable secure identity based generalized signcryption scheme ⋮ Identity Based Public Verifiable Signcryption Scheme ⋮ Fully Secure Threshold Unsigncryption ⋮ Signcryption from randomness recoverable public key encryption ⋮ ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message ⋮ Efficient Identity-Based Signcryption in the Standard Model
This page was built for publication: Information Security and Cryptology - ICISC 2003