Certificateless undeniable signature scheme
From MaRDI portal
Publication:2466071
DOI10.1016/j.ins.2007.08.009zbMath1134.94373OpenAlexW2154719011MaRDI QIDQ2466071
Publication date: 11 January 2008
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2007.08.009
Related Items (18)
Certificateless signcryption scheme in the standard model ⋮ A pure labeled transition semantics for the applied pi calculus ⋮ Forward-secure identity-based signature: security notions and construction ⋮ A new provably secure certificateless short signature scheme ⋮ Efficient certificateless proxy signature scheme with provable security ⋮ Certificateless proxy signature from RSA ⋮ Certificate-based verifiably encrypted signatures from pairings ⋮ Certificateless threshold signature secure in the standard model ⋮ Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model ⋮ Self-generated-certificate public key encryption without pairing and its application ⋮ Simulatable certificateless two-party authenticated key agreement protocol ⋮ Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism ⋮ Certificateless undeniable signatures from bilinear maps ⋮ Certificateless threshold ring signature ⋮ Efficient Certificateless Proxy Signature Scheme ⋮ Black-box constructions of signature schemes in the bounded leakage setting ⋮ An efficient certificateless undeniable signature scheme ⋮ A randomized analog of Chaum - van Antwerpen undeniable signature
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Simulatability and security of certificateless threshold signatures
- An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
- Efficient undeniable signature schemes based on ideal arithmetic in quadratic orders
- Convertible undeniable signature with subliminal channels
- A novel ID-based group signature
- Designated Verifier Proofs and Their Applications
- Identity-Based Cryptosystems and Signature Schemes
- Undeniable Signatures
- A Fault Attack on Pairing-Based Cryptography
- The security of the FDH variant of Chaum's undeniable signature scheme
- Identity-Based Encryption from the Weil Pairing
- Information Security and Privacy
- Public Key Cryptography - PKC 2005
- Topics in Cryptology – CT-RSA 2004
- Public Key Cryptography – PKC 2004
- Public Key Cryptography – PKC 2004
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: Certificateless undeniable signature scheme