Signcryption schemes with threshold unsigncryption, and applications
From MaRDI portal
Publication:2439735
DOI10.1007/S10623-012-9688-0zbMATH Open1323.94116OpenAlexW1977254827MaRDI QIDQ2439735FDOQ2439735
Authors: Javier Herranz, Alexandre Ruiz, Germán Sáez
Publication date: 17 March 2014
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/2117/105873
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Security arguments for digital signatures and blind signatures
- How to share a secret
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Securing threshold cryptosystems against chosen ciphertext attack
- Topics in Cryptology – CT-RSA 2006
- One-time signatures and chameleon hash functions
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Secure distributed key generation for discrete-log based cryptosystems
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - CRYPTO 2003
- Public Key Cryptography - PKC 2006
- Information Security and Cryptology
- Title not available (Why is that?)
- Practical Threshold Signatures Without Random Oracles
- Short Threshold Signature Schemes Without Random Oracles
- On the Security of Identity Based Ring Signcryption Schemes
- Title not available (Why is that?)
- Fully secure threshold unsigncryption
Cited In (8)
- Title not available (Why is that?)
- Threshold Schnorr with stateless deterministic signing from standard assumptions
- Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt”
- Threshold Attribute-Based Signcryption
- Breaking and building of threshold signcryption schemes
- Information Security
- An ID-based \((u,m)\) threshold signcryption scheme with \((t,n)\) shared unsigncryption
- Fully secure threshold unsigncryption
This page was built for publication: Signcryption schemes with threshold unsigncryption, and applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2439735)