Certificateless Signature Revisited

From MaRDI portal
Publication:3608927

DOI10.1007/978-3-540-73458-1_23zbMath1213.94158OpenAlexW1959942577MaRDI QIDQ3608927

Yi Mu, Willy Susilo, Wei Wu, Duncan S. Wong, Xin-Yi Huang

Publication date: 6 March 2009

Published in: Information Security and Privacy (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-73458-1_23




Related Items (33)

Privacy-preserving file sharing on cloud storage with certificateless signcryptionCertificateless aggregate signature scheme secure against fully chosen-key attacksCertificateless threshold signature scheme from bilinear mapsCertificateless message recovery signatures providing Girault's level-3 securityA Provably Secure Ring Signature Scheme in Certificateless CryptographyA pairing-free and provably secure certificateless signature schemeCertificateless Public Key Signature Schemes from Standard AlgorithmsDelegation of signing rights using certificateless proxy signaturesA new provably secure certificateless short signature schemeCryptanalysis and improvement of three certificateless aggregate signature schemesCertificateless signature scheme with security enhanced in the standard modelAn efficient certificateless proxy signature scheme without pairingPrivacy-preserving certificateless provable data possession scheme for big data storage on cloudCertificateless threshold signature secure in the standard modelCryptanalysis and improvement of a certificateless threshold signature secure in the standard modelCertificateless one-pass and two-party authenticated key agreement protocol and its extensionsAn efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networksA provable authenticated group key agreement protocol for mobile environmentSelf-generated-certificate public key encryption without pairing and its applicationSimulatable certificateless two-party authenticated key agreement protocolCertificateless undeniable signatures from bilinear mapsCertificateless cryptography with KGC trust level 3Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless SignaturesComment on a certificateless one-pass and two-party authenticated key agreement protocolCertificate-free \textit{ad hoc} anonymous authenticationSignatures in hierarchical certificateless cryptography: efficient constructions and provable securityCertificateless proxy multi-signatureCertificateless threshold ring signatureBreaking the short certificateless signature schemeBlack-box constructions of signature schemes in the bounded leakage settingEfficient and Short Certificateless SignatureLattice-based revocable certificateless signatureUnnamed Item




This page was built for publication: Certificateless Signature Revisited