The following pages link to (Q4474196):
Displaying 50 items.
- On the security of two identity-based signature schemes based on pairings (Q264198) (← links)
- Structure-preserving signatures and commitments to group elements (Q290392) (← links)
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- A new universal designated verifier transitive signature scheme for big graph data (Q314806) (← links)
- Identity-based key distribution for mobile ad hoc networks (Q352090) (← links)
- Signal-flow-based analysis of wireless security protocols (Q385716) (← links)
- Identity-based threshold decryption on access structure (Q407450) (← links)
- Certificateless message recovery signatures providing Girault's level-3 security (Q407496) (← links)
- Secure proxy signature schemes for delegation of signing rights (Q421030) (← links)
- Programmable hash functions and their applications (Q434345) (← links)
- Efficient certificateless proxy signature scheme with provable security (Q454968) (← links)
- Efficient algorithms for secure outsourcing of bilinear pairings (Q476851) (← links)
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal (Q488261) (← links)
- Algebraic (trapdoor) one-way functions: constructions and applications (Q500981) (← links)
- One forward-secure signature scheme using bilinear maps and its applications (Q506297) (← links)
- A pairing-based publicly verifiable secret sharing scheme (Q545465) (← links)
- The generalized Weil pairing and the discrete logarithm problem on elliptic curves (Q596141) (← links)
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators (Q621645) (← links)
- Efficient proxy signcryption scheme with provable CCA and CMA security (Q623106) (← links)
- Provably secure server-aided verification signatures (Q636553) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Private key agreement and secure communication for heterogeneous sensor networks (Q666197) (← links)
- Security of BLS and BGLS signatures in a multi-user setting (Q680920) (← links)
- Generic security-amplifying methods of ordinary digital signatures (Q712706) (← links)
- Identity-based trapdoor mercurial commitments and applications (Q719291) (← links)
- An identity-based strongly unforgeable signature without random oracles from bilinear pairings (Q726463) (← links)
- An enhanced \((t,n)\) threshold directed signature scheme (Q726561) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Uniform encodings to elliptic curves and indistinguishable point representation (Q782846) (← links)
- Generic construction for tightly-secure signatures from discrete log (Q820557) (← links)
- EPID with malicious revocation (Q826251) (← links)
- Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures (Q826296) (← links)
- Efficient discrete logarithm based multi-signature scheme in the plain public key model (Q849361) (← links)
- A comparison of MNT curves and supersingular curves (Q862563) (← links)
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange (Q865906) (← links)
- On computable isomorphisms in efficient asymmetric pairing-based systems (Q869575) (← links)
- An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices (Q884001) (← links)
- The random oracle model: a twenty-year retrospective (Q887442) (← links)
- Implementing optimized pairings with elliptic nets (Q893619) (← links)
- A short non-delegatable strong designated verifier signature (Q893866) (← links)
- Cloud data auditing with designated verifier (Q893869) (← links)
- Identity-based chameleon hashing and signatures without key exposure (Q903661) (← links)
- Certificate-based verifiably encrypted signatures from pairings (Q924671) (← links)
- Efficient Tate pairing computation using double-base chains (Q954437) (← links)
- Efficient generic on-line/off-line (threshold) signatures without key exposure (Q955733) (← links)
- Tate and Ate pairings for \(y^2=x^5-\alpha x\) in characteristic five (Q957691) (← links)
- A method for constructing a self-dual normal basis in odd characteristic extension fields (Q958601) (← links)
- Short fail-stop signature scheme based on factorization and discrete logarithm assumptions (Q1006046) (← links)
- Breaking the short certificateless signature scheme (Q1007845) (← links)
- On bilinear structures on divisor class groups (Q1017359) (← links)