An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
From MaRDI portal
(Redirected from Publication:396599)
Recommendations
- New identity-based cryptographic scheme for IFP and DLP based cryptosystem
- scientific article; zbMATH DE number 4057441
- An ID-based cryptographic mechanisms based on GDLP and IFP
- Constructing identity-based cryptographic scheme for beta cryptosystem
- An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
Cites work
- scientific article; zbMATH DE number 177614 (Why is no real title available?)
- scientific article; zbMATH DE number 1302836 (Why is no real title available?)
- scientific article; zbMATH DE number 2009960 (Why is no real title available?)
- A cryptosystem based on double generalized discrete logarithm problem
- A public key cryptosystem and a signature scheme based on discrete logarithms
- An ID-based cryptographic mechanisms based on GDLP and IFP
- An Identity Based Encryption Scheme Based on Quadratic Residues
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Efficient identification and signature schemes
- Identity-Based Encryption from the Weil Pairing
- Identity-based cryptosystems and signature schemes
- New directions in cryptography
- Security proofs for identity-based identification and signature schemes
Cited in
(16)- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- Constructing identity-based cryptographic scheme for beta cryptosystem
- An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
- ID-based public key cryptographic systems
- An efficient online/offline ID-based short signature procedure using extended chaotic maps
- scientific article; zbMATH DE number 177023 (Why is no real title available?)
- scientific article; zbMATH DE number 4057441 (Why is no real title available?)
- Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology
- An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem
- Constructing ID-based cryptographic technique for IFP and GDLP based cryptosystem
- Breaking an ID-based encryption based on discrete logarithm and factorization problems
- Improvement on Meshram et al.'s ID-based cryptographic mechanism
- New identity-based cryptographic scheme for IFP and DLP based cryptosystem
- An ID-based cryptographic mechanisms based on GDLP and IFP
- An ID-based key sharing scheme based on discrete logarithm problem over a product of three primes
- An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
This page was built for publication: An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q396599)