Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures
From MaRDI portal
Publication:2907378
DOI10.1007/978-3-642-31448-3_21zbMATH Open1308.94101OpenAlexW1551096431MaRDI QIDQ2907378FDOQ2907378
Authors: S. Selvi, S. Sree Vivek, C. Pandu Rangan
Publication date: 7 September 2012
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-31448-3_21
Recommendations
- Public Key Cryptography - PKC 2006
- Identity based aggregate signcryption schemes
- Identity-based aggregate and multi-signature schemes based on RSA
- Identity-based key-insulated aggregate signatures, revisited
- Cryptology and Network Security
- Information Security and Privacy
- The generic transformation from standard signatures to identity-based aggregate signatures
- Identity-based deterministic signature scheme without forking-lemma
provable securityrandom oracle modelaggregate signaturefull aggregationidentity based deterministic signature
Cited In (5)
- Identity-based deterministic signature scheme without forking-lemma
- Security weaknesses of a signature scheme and authenticated key agreement protocols
- Achieving pairing-free aggregate signatures using pre-communication between signers
- A new attack against the Selvi-Vivek-Rangan deterministic identity based signature scheme from ACISP 2012
- Identity-based aggregate and multi-signature schemes based on RSA
This page was built for publication: Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2907378)