Certificateless undeniable signature scheme
From MaRDI portal
Publication:2466071
DOI10.1016/j.ins.2007.08.009zbMath1134.94373MaRDI QIDQ2466071
Publication date: 11 January 2008
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2007.08.009
provable security; random oracle; zero-knowledge; certificateless; undeniable signature; non-transferable
94A62: Authentication, digital signatures and secret sharing
Related Items
An efficient certificateless undeniable signature scheme, Efficient certificateless proxy signature scheme with provable security, Certificateless threshold signature secure in the standard model, Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model, Self-generated-certificate public key encryption without pairing and its application, A pure labeled transition semantics for the applied pi calculus, Forward-secure identity-based signature: security notions and construction, A new provably secure certificateless short signature scheme, Certificateless undeniable signatures from bilinear maps, Certificateless threshold ring signature, Certificateless signcryption scheme in the standard model, Certificate-based verifiably encrypted signatures from pairings, Certificateless proxy signature from RSA, Simulatable certificateless two-party authenticated key agreement protocol, Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism, Efficient Certificateless Proxy Signature Scheme
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Simulatability and security of certificateless threshold signatures
- An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
- Efficient undeniable signature schemes based on ideal arithmetic in quadratic orders
- Convertible undeniable signature with subliminal channels
- A novel ID-based group signature
- Designated Verifier Proofs and Their Applications
- Identity-Based Cryptosystems and Signature Schemes
- Undeniable Signatures
- A Fault Attack on Pairing-Based Cryptography
- The security of the FDH variant of Chaum's undeniable signature scheme
- Identity-Based Encryption from the Weil Pairing
- Information Security and Privacy
- Public Key Cryptography - PKC 2005
- Topics in Cryptology – CT-RSA 2004
- Public Key Cryptography – PKC 2004
- Public Key Cryptography – PKC 2004
- Advances in Cryptology - ASIACRYPT 2003