Certificateless Signature Revisited
From MaRDI portal
Publication:3608927
DOI10.1007/978-3-540-73458-1_23zbMath1213.94158OpenAlexW1959942577MaRDI QIDQ3608927
Yi Mu, Willy Susilo, Wei Wu, Duncan S. Wong, Xin-Yi Huang
Publication date: 6 March 2009
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-73458-1_23
Related Items (33)
Privacy-preserving file sharing on cloud storage with certificateless signcryption ⋮ Certificateless aggregate signature scheme secure against fully chosen-key attacks ⋮ Certificateless threshold signature scheme from bilinear maps ⋮ Certificateless message recovery signatures providing Girault's level-3 security ⋮ A Provably Secure Ring Signature Scheme in Certificateless Cryptography ⋮ A pairing-free and provably secure certificateless signature scheme ⋮ Certificateless Public Key Signature Schemes from Standard Algorithms ⋮ Delegation of signing rights using certificateless proxy signatures ⋮ A new provably secure certificateless short signature scheme ⋮ Cryptanalysis and improvement of three certificateless aggregate signature schemes ⋮ Certificateless signature scheme with security enhanced in the standard model ⋮ An efficient certificateless proxy signature scheme without pairing ⋮ Privacy-preserving certificateless provable data possession scheme for big data storage on cloud ⋮ Certificateless threshold signature secure in the standard model ⋮ Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model ⋮ Certificateless one-pass and two-party authenticated key agreement protocol and its extensions ⋮ An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks ⋮ A provable authenticated group key agreement protocol for mobile environment ⋮ Self-generated-certificate public key encryption without pairing and its application ⋮ Simulatable certificateless two-party authenticated key agreement protocol ⋮ Certificateless undeniable signatures from bilinear maps ⋮ Certificateless cryptography with KGC trust level 3 ⋮ Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures ⋮ Comment on a certificateless one-pass and two-party authenticated key agreement protocol ⋮ Certificate-free \textit{ad hoc} anonymous authentication ⋮ Signatures in hierarchical certificateless cryptography: efficient constructions and provable security ⋮ Certificateless proxy multi-signature ⋮ Certificateless threshold ring signature ⋮ Breaking the short certificateless signature scheme ⋮ Black-box constructions of signature schemes in the bounded leakage setting ⋮ Efficient and Short Certificateless Signature ⋮ Lattice-based revocable certificateless signature ⋮ Unnamed Item
This page was built for publication: Certificateless Signature Revisited