A Schnorr-Like Lightweight Identity-Based Signature Scheme
From MaRDI portal
Publication:3637136
DOI10.1007/978-3-642-02384-2_9zbMATH Open1246.94045OpenAlexW2121355373MaRDI QIDQ3637136FDOQ3637136
Authors: David Galindo, Flavio D. Garcia
Publication date: 7 July 2009
Published in: Progress in Cryptology – AFRICACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-02384-2_9
Recommendations
- An efficient identity-based signature scheme with provable security
- Identity based public verifiable signcryption scheme
- scientific article; zbMATH DE number 1951619
- scientific article; zbMATH DE number 1440046
- Information Security and Privacy
- Efficient Identity-Based Signatures Secure in the Standard Model
- Cryptology and Network Security
- scientific article; zbMATH DE number 1420972
identity-based signatureprovable securityrandom oracle modellightweight cryptographySchnorr signature
Cites Work
- Security arguments for digital signatures and blind signatures
- Identity-based cryptosystems and signature schemes
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Title not available (Why is that?)
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - EUROCRYPT 2004
- Efficient signature generation by smart cards
- Implementing Cryptographic Pairings over Barreto-Naehrig Curves
- Advances in Elliptic Curve Cryptography
- Algorithmic Number Theory
- Secure proxy signature schemes for delegation of signing rights
- Title not available (Why is that?)
- Title not available (Why is that?)
- Information Security
- A Closer Look at PKI: Security and Efficiency
- Title not available (Why is that?)
- Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- Generating more MNT elliptic curves
- Secret Handshakes from CA-Oblivious Encryption
- Title not available (Why is that?)
Cited In (14)
- Identity-based deterministic signature scheme without forking-lemma
- A closer look at multiple forking: leveraging (in)dependence for a tighter bound
- One-round identity-based key exchange with perfect forward security
- A hierarchical identity-based identification scheme without pairing
- Security weakness of a certificate-based proxy signature scheme for IIoT environments
- Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited
- A Tightly Secure Identity-Based Signature Scheme from Isogenies
- A tightly secure ID-based signature scheme under DL assumption in AGM
- Toward tight security of the Galindo-Garcia identity-based signature
- Tight security for the generic construction of identity-based signature (in the multi-instance setting)
- Multiple point compression on elliptic curves
- An efficient online/offline ID-based short signature procedure using extended chaotic maps
- Identity-based signatures in standard model
- Identity-based interactive aggregate signatures from lattices
This page was built for publication: A Schnorr-Like Lightweight Identity-Based Signature Scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3637136)