Certificateless Signature Revisited
From MaRDI portal
Publication:3608927
DOI10.1007/978-3-540-73458-1_23zbMATH Open1213.94158OpenAlexW1959942577MaRDI QIDQ3608927FDOQ3608927
Authors: Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu, Xinyi Huang
Publication date: 6 March 2009
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-73458-1_23
Recommendations
- scientific article; zbMATH DE number 5622710
- Certificateless undeniable signature scheme
- Certificateless signature: a new security model and an improved generic construction
- Security models for certificateless signature schemes revisited
- Efficient Certificateless Signature Schemes
- Security Mediated Certificateless Signatures
- On security of a certificateless signcryption scheme
- Provably security and efficient certificateless signature scheme
Cited In (36)
- Certificateless message recovery signatures providing Girault's level-3 security
- A new provably secure certificateless signature with revocation in the standard model
- Lattice-based revocable certificateless signature
- Self-generated-certificate public key encryption without pairing and its application
- Certificateless signature scheme with security enhanced in the standard model
- Certificateless proxy multi-signature
- Certificateless threshold ring signature
- Simulatable certificateless two-party authenticated key agreement protocol
- Breaking the short certificateless signature scheme
- A provable authenticated group key agreement protocol for mobile environment
- Certificateless Public Key Signature Schemes from Standard Algorithms
- Privacy-preserving certificateless provable data possession scheme for big data storage on cloud
- Certificateless cryptography with KGC trust level 3
- Certificate-free \textit{ad hoc} anonymous authentication
- An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
- Privacy-preserving file sharing on cloud storage with certificateless signcryption
- Delegation of signing rights using certificateless proxy signatures
- Efficient and Short Certificateless Signature
- Two Notes on the Security of Certificateless Signatures
- Certificateless threshold signature scheme from bilinear maps
- Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures
- Cryptanalysis and improvement of three certificateless aggregate signature schemes
- Comment on a certificateless one-pass and two-party authenticated key agreement protocol
- A pairing-free and provably secure certificateless signature scheme
- Certificateless undeniable signatures from bilinear maps
- Black-box constructions of signature schemes in the bounded leakage setting
- Title not available (Why is that?)
- Certificateless threshold signature secure in the standard model
- Certificateless aggregate signature scheme secure against fully chosen-key attacks
- Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
- A new provably secure certificateless short signature scheme
- Security Mediated Certificateless Signatures
- Certificateless one-pass and two-party authenticated key agreement protocol and its extensions
- An efficient certificateless proxy signature scheme without pairing
- A Provably Secure Ring Signature Scheme in Certificateless Cryptography
- Signatures in hierarchical certificateless cryptography: efficient constructions and provable security
This page was built for publication: Certificateless Signature Revisited
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3608927)