A Schnorr-Like Lightweight Identity-Based Signature Scheme
From MaRDI portal
Publication:3637136
Recommendations
- An efficient identity-based signature scheme with provable security
- Identity based public verifiable signcryption scheme
- scientific article; zbMATH DE number 1951619
- scientific article; zbMATH DE number 1440046
- Information Security and Privacy
- Efficient Identity-Based Signatures Secure in the Standard Model
- Cryptology and Network Security
- scientific article; zbMATH DE number 1420972
Cites work
- scientific article; zbMATH DE number 177613 (Why is no real title available?)
- scientific article; zbMATH DE number 708798 (Why is no real title available?)
- scientific article; zbMATH DE number 1942431 (Why is no real title available?)
- scientific article; zbMATH DE number 1951619 (Why is no real title available?)
- scientific article; zbMATH DE number 1424190 (Why is no real title available?)
- A Closer Look at PKI: Security and Efficiency
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Elliptic Curve Cryptography
- Algorithmic Number Theory
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
- Efficient signature generation by smart cards
- Generating more MNT elliptic curves
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Identity-Based Encryption from the Weil Pairing
- Identity-based cryptosystems and signature schemes
- Implementing Cryptographic Pairings over Barreto-Naehrig Curves
- Information Security
- Secret Handshakes from CA-Oblivious Encryption
- Secure proxy signature schemes for delegation of signing rights
- Security arguments for digital signatures and blind signatures
Cited in
(14)- One-round identity-based key exchange with perfect forward security
- A Tightly Secure Identity-Based Signature Scheme from Isogenies
- Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited
- Tight security for the generic construction of identity-based signature (in the multi-instance setting)
- An efficient online/offline ID-based short signature procedure using extended chaotic maps
- Identity-based deterministic signature scheme without forking-lemma
- A tightly secure ID-based signature scheme under DL assumption in AGM
- Toward tight security of the Galindo-Garcia identity-based signature
- Identity-based signatures in standard model
- Multiple point compression on elliptic curves
- A hierarchical identity-based identification scheme without pairing
- Identity-based interactive aggregate signatures from lattices
- A closer look at multiple forking: leveraging (in)dependence for a tighter bound
- Security weakness of a certificate-based proxy signature scheme for IIoT environments
This page was built for publication: A Schnorr-Like Lightweight Identity-Based Signature Scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3637136)