On the security of two identity-based signature schemes based on pairings
From MaRDI portal
Publication:264198
DOI10.1016/J.IPL.2016.02.003zbMATH Open1401.94170OpenAlexW2285763236MaRDI QIDQ264198FDOQ264198
Authors: Zhen Qin, Chen Yuan, Yilei Wang, Hu Xiong
Publication date: 6 April 2016
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2016.02.003
Recommendations
- scientific article; zbMATH DE number 1951619
- Cryptology and Network Security
- Cryptanalysis of ``an identity-based society oriented signature scheme with anonymous signers
- Cryptanalysis and improvement of a strongly unforgeable identity-based signature scheme
- Identity-based undeniable signatures from bilinear pairings
Cites Work
Cited In (6)
- The security of two ID-based multisignature protocols for sequential and broadcasting architectures
- Security weaknesses of a signature scheme and authenticated key agreement protocols
- Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC ’05
- Two-party adaptor signatures from identification schemes
- Title not available (Why is that?)
- A new attack against the Selvi-Vivek-Rangan deterministic identity based signature scheme from ACISP 2012
This page was built for publication: On the security of two identity-based signature schemes based on pairings
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q264198)