Certificateless undeniable signature scheme
From MaRDI portal
Publication:2466071
DOI10.1016/J.INS.2007.08.009zbMATH Open1134.94373OpenAlexW2154719011MaRDI QIDQ2466071FDOQ2466071
Authors: Shanshan Duan
Publication date: 11 January 2008
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2007.08.009
Recommendations
Cites Work
- Identity-based cryptosystems and signature schemes
- Title not available (Why is that?)
- Identity-Based Encryption from the Weil Pairing
- Information Security and Privacy
- Certificateless public key cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Designated verifier proofs and their applications
- Undeniable Signatures
- Title not available (Why is that?)
- Public Key Cryptography – PKC 2004
- Simulatability and security of certificateless threshold signatures
- Efficient undeniable signature schemes based on ideal arithmetic in quadratic orders
- Title not available (Why is that?)
- Topics in Cryptology – CT-RSA 2004
- Public Key Cryptography – PKC 2004
- A novel ID-based group signature
- Title not available (Why is that?)
- Convertible undeniable signature with subliminal channels
- A Fault Attack on Pairing-Based Cryptography
- The security of the FDH variant of Chaum's undeniable signature scheme
- Title not available (Why is that?)
- Title not available (Why is that?)
- An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
- Public Key Cryptography - PKC 2005
Cited In (22)
- Efficient certificateless proxy signature scheme
- Self-generated-certificate public key encryption without pairing and its application
- An efficient certificateless undeniable signature scheme
- Certificateless threshold ring signature
- Simulatable certificateless two-party authenticated key agreement protocol
- A randomized analog of Chaum - van Antwerpen undeniable signature
- Unrestricted Aggregate Signatures
- Efficient certificateless proxy signature scheme with provable security
- Forward-secure identity-based signature: security notions and construction
- Certificateless signcryption scheme in the standard model
- A pure labeled transition semantics for the applied pi calculus
- Title not available (Why is that?)
- Certificateless undeniable signatures from bilinear maps
- Black-box constructions of signature schemes in the bounded leakage setting
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
- Certificateless threshold signature secure in the standard model
- Certificateless Signature Revisited
- Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
- A new provably secure certificateless short signature scheme
- Certificate-based verifiably encrypted signatures from pairings
- Certificateless proxy signature from RSA
- Strongly secure certificateless signature scheme supporting batch verification
This page was built for publication: Certificateless undeniable signature scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2466071)