A provably secure proxy signcryption scheme using bilinear pairings
From MaRDI portal
Publication:2336432
Recommendations
Cites work
- scientific article; zbMATH DE number 1186868 (Why is no real title available?)
- scientific article; zbMATH DE number 1304303 (Why is no real title available?)
- scientific article; zbMATH DE number 1088233 (Why is no real title available?)
- scientific article; zbMATH DE number 1942431 (Why is no real title available?)
- scientific article; zbMATH DE number 2081084 (Why is no real title available?)
- scientific article; zbMATH DE number 1487950 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- A method for obtaining digital signatures and public-key cryptosystems
- Cryptanalysis of efficient proxy signature schemes for mobile communication
- Designing efficient proxy signature schemes for mobile communication
- Efficient and Provably Secure Multi-receiver Identity-Based Signcryption
- Efficient proxy signcryption scheme with provable CCA and CMA security
- Hierarchical ID-Based Cryptography
- ID-Based Blind Signature and Ring Signature from Pairings
- New directions in cryptography
- Selected Areas in Cryptography
Cited in
(6)- Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey
- A new threshold proxy signature scheme from bilinear pairings
- Efficient proxy signcryption scheme with provable CCA and CMA security
- A secure anonymous proxy signcryption scheme
- Cryptology and Network Security
- Cryptology and Network Security
This page was built for publication: A provably secure proxy signcryption scheme using bilinear pairings
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2336432)