Certificateless undeniable signature scheme
From MaRDI portal
Publication:2466071
Recommendations
Cites work
- scientific article; zbMATH DE number 176568 (Why is no real title available?)
- scientific article; zbMATH DE number 177613 (Why is no real title available?)
- scientific article; zbMATH DE number 1088906 (Why is no real title available?)
- scientific article; zbMATH DE number 1088936 (Why is no real title available?)
- scientific article; zbMATH DE number 1951619 (Why is no real title available?)
- scientific article; zbMATH DE number 1962144 (Why is no real title available?)
- scientific article; zbMATH DE number 2079929 (Why is no real title available?)
- scientific article; zbMATH DE number 1406768 (Why is no real title available?)
- A Fault Attack on Pairing-Based Cryptography
- A novel ID-based group signature
- An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
- Certificateless public key cryptography
- Convertible undeniable signature with subliminal channels
- Designated verifier proofs and their applications
- Efficient undeniable signature schemes based on ideal arithmetic in quadratic orders
- Identity-Based Encryption from the Weil Pairing
- Identity-based cryptosystems and signature schemes
- Information Security and Privacy
- Public Key Cryptography - PKC 2005
- Public Key Cryptography – PKC 2004
- Public Key Cryptography – PKC 2004
- Simulatability and security of certificateless threshold signatures
- The security of the FDH variant of Chaum's undeniable signature scheme
- Topics in Cryptology – CT-RSA 2004
- Undeniable Signatures
Cited in
(22)- Efficient certificateless proxy signature scheme
- Self-generated-certificate public key encryption without pairing and its application
- Certificateless threshold ring signature
- Simulatable certificateless two-party authenticated key agreement protocol
- An efficient certificateless undeniable signature scheme
- A randomized analog of Chaum - van Antwerpen undeniable signature
- Efficient certificateless proxy signature scheme with provable security
- Unrestricted Aggregate Signatures
- Forward-secure identity-based signature: security notions and construction
- Certificateless signcryption scheme in the standard model
- A pure labeled transition semantics for the applied pi calculus
- scientific article; zbMATH DE number 6867751 (Why is no real title available?)
- Certificateless undeniable signatures from bilinear maps
- Black-box constructions of signature schemes in the bounded leakage setting
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
- Certificateless threshold signature secure in the standard model
- Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
- Certificateless Signature Revisited
- A new provably secure certificateless short signature scheme
- Certificate-based verifiably encrypted signatures from pairings
- Certificateless proxy signature from RSA
- Strongly secure certificateless signature scheme supporting batch verification
This page was built for publication: Certificateless undeniable signature scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2466071)