A public key cryptosystem and a signature scheme based on discrete logarithms
From MaRDI portal
Publication:3689092
Recommendations
Cites work
- scientific article; zbMATH DE number 1302835 (Why is no real title available?)
- scientific article; zbMATH DE number 1302853 (Why is no real title available?)
- scientific article; zbMATH DE number 2081087 (Why is no real title available?)
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Chosen-Ciphertext Security via Correlated Products
- Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security
- Orthogonality between Key Privacy and Data Privacy, Revisited
- Probabilistic encryption
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
Cited in
(only showing first 100 items - show all)- Parallel computation of the multi-exponentiation for cryptosystems
- New designing of cryptosystems based on quadratic fields
- A new digital signature scheme based on chaotic maps
- SoK: how (not) to design and implement post-quantum cryptography
- Low complexity normal bases
- SPEEDING UP MULTI- EXPONENTIATION ALGORITHM ON A MULTICORE SYSTEM
- New ideas to build noise-free homomorphic cryptosystems
- A formal language for cryptographic protocol requirements
- On the algebraic structure of \(E_p^{(m)}\) and applications to cryptography
- A new protocol for multi-item electronic auctions
- Adaptively secure distributed public-key systems.
- Signcryption schemes with insider security in an ideal permutation model
- A novel cryptosystem based on grey system theory and genetic algorithm
- Cryptanalysis and an Improvement of New Remote Mutual Authentication Scheme using Smart Cards
- Strong Designated Verifier Signature Scheme Based on Discrete Logarithm Problem
- Trustworthy sealed-bid auction with low communication cost atop blockchain
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Decentralized anonymous micropayments
- Cryptography using generalized Fibonacci matrices with Affine-Hill cipher
- New multisignature scheme for specified group of verifiers
- An efficient ID-based user identification scheme for mutual authentication in mobile environments
- Semi-generic construction of public key encryption and identity-based encryption with equality test
- Efficient privacy-preserving outsourced \(k\)-means clustering on distributed data
- Ad-hoc threshold broadcast encryption with shorter ciphertexts
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- Information-theoretic secure verifiable secret sharing over RSA modulus
- Security analysis of discrete logarithm based cryptosystems
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- Message transmission for GH-public key cryptosystem
- Efficient public key encryption with equality test in the standard model
- Divisible On-Line/Off-Line Signatures
- A new cryptosystem using generalized Mersenne primes
- Pairings in local fields and cryptography
- A remote password authentication scheme based on the digital signature method
- An ID-based cryptographic mechanisms based on GDLP and IFP
- New public-key cryptosystem
- Should one always use repeated squaring for modular exponentiation?
- Efficient chain-encryption-based quantum signature scheme with semi-trusted arbitrator
- Improved digital signature scheme based on factoring and discrete logarithms
- Quantum signature without classical private key
- Homomorphically encrypted \(k\)-means on cloud-hosted servers with low client-side load
- Scalable multi-party private set-intersection
- The geometry of provable security: some proofs of security in which lattices make a surprise appearance
- A simple provably secure AKE from the LWE problem
- An efficient quantum digital signature for classical messages
- One private-key for all DL-based cryptosystems
- Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack
- A public-key traitor tracing scheme with revocation using dynamic shares
- Remarks on some signature schemes based on factoring and discrete logarithms
- From the hardness of detecting superpositions to cryptography: quantum public key encryption and commitments
- Attacks on provably secure proxy-protected signature schemes based on factoring
- Small generic hardcore subsets for the discrete logarithm: short secret DL-keys.
- Novel digital signature scheme with multiple private keys on non-commutative division semirings
- Security properties of one ``short signature scheme
- Verifiable quantum protocol for dynamic secure multiparty summation based on homomorphic encryption
- Improvement of Tseng et al.'s authenticated encryption scheme with message linkages
- Traps to the BGJT-algorithm for discrete logarithms
- A new enhancement of elliptic curve digital signature algorithm
- scientific article; zbMATH DE number 7565360 (Why is no real title available?)
- Analysis of sliding window techniques for exponentiation
- On some connections between statistics and cryptology
- Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
- An efficient collision detection method for computing discrete logarithms with Pollard's rho
- Fast exponentiation by folding the signed-digit exponent in half
- On relationship of computational Diffie-Hellman problem and computational square-root exponent problem
- Fair Threshold Decryption with Semi-Trusted Third Parties
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- An iterative modular multiplication algorithm
- Providing data confidentiality against malicious hosts in shared data spaces
- A note on the security of \(\text{MST} _{3}\)
- A generalization of the ElGamal public-key cryptosystem
- Fast modular multiplication based on complement representation and canonical recoding
- A password authentication scheme based on discrete logarithms
- A novel text and image encryption method based on chaos theory and DNA computing
- Concurrent knowledge extraction in public-key models
- Secure parameterized pattern matching
- Efficient set intersection with simulation-based security
- A new provably secure certificateless signature with revocation in the standard model
- Practical electronic auction scheme with strong anonymity and bidding privacy
- Public key cryptography using semigroup actions and semirings
- Fast generation of prime numbers and secure public-key cryptographic parameters.
- Oblivious transfer from weakly random self-reducible public-key cryptosystem
- A signature scheme for a dynamic coalition defence environment without trusted third parties
- LMS vs XMSS: comparison of stateful hash-based signature schemes on ARM Cortex-M4
- Some basics on privacy techniques, anonymization and their big data challenges
- scientific article; zbMATH DE number 7589881 (Why is no real title available?)
- Hash-based signatures revisited: a dynamic FORS with adaptive chosen message security
- Partial information in public key cryptography
- Efficient message transmission via twisted Edwards curves
- Proxy signature schemes based on factoring
- A new signature scheme based on factoring and discrete logarithms
- Cryptanalysis of NTRU where the private polynomial has one or more consecutive zero coefficients
- Improved authenticated multiple-key agreement protocol without using conventional one-way function.
- Nonrepudiable proxy multi-signature scheme
- Unidirectional updatable encryption and proxy re-encryption from DDH
- A designated verifier signature using secret sharing technique
- Gauss periods: orders and cryptographical applications
- Transformations of cryptographic schemes through interpolation techniques
- Cryptanalysis of a noncommutative key exchange protocol
- Unlinkable and invisible \(\gamma \)-sanitizable signatures
This page was built for publication: A public key cryptosystem and a signature scheme based on discrete logarithms
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3689092)