Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures
From MaRDI portal
Publication:2907378
Recommendations
- Public Key Cryptography - PKC 2006
- Identity based aggregate signcryption schemes
- Identity-based aggregate and multi-signature schemes based on RSA
- Identity-based key-insulated aggregate signatures, revisited
- Cryptology and Network Security
- Information Security and Privacy
- The generic transformation from standard signatures to identity-based aggregate signatures
- Identity-based deterministic signature scheme without forking-lemma
Cited in
(5)- Identity-based deterministic signature scheme without forking-lemma
- Security weaknesses of a signature scheme and authenticated key agreement protocols
- Achieving pairing-free aggregate signatures using pre-communication between signers
- Identity-based aggregate and multi-signature schemes based on RSA
- A new attack against the Selvi-Vivek-Rangan deterministic identity based signature scheme from ACISP 2012
This page was built for publication: Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2907378)