scientific article; zbMATH DE number 1088233

From MaRDI portal
Publication:4364550

zbMath1058.94524MaRDI QIDQ4364550

Yuliang Zheng

Publication date: 7 January 1998


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (82)

Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairingAn efficient and secure identity based multiple signatures scheme based on RSACertificateless Identity-Concealed Authenticated Encryption Under Multi-KGCA new forward-secure authenticated encryption scheme with message linkagesA generic solution to realize public verifiability of signcryptionHow to construct efficient signcryption schemes on elliptic curvesA secure anonymous proxy signcryption schemePrivacy-preserving file sharing on cloud storage with certificateless signcryptionAnalysis of improved signcryption scheme with key privacyVetted encryptionConstructing parallel long-message signcryption scheme from trapdoor permutationOn methods of shortening ElGamal-type signaturesA Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding TheoryOn the security of joint signature and encryption revisitedAn efficient signcryption for data access control in cloud computingCertificate-based signcryption with enhanced security featuresSigncryption with fast online signing and short signcryptext for secure and private mobile communicationOne-Round Attribute-Based Key Exchange in the Multi-party SettingCryptanalysis of a signcryption scheme with fast online signing and short signcryptextCryptanalysis of a certificateless signcryption scheme in the standard modelElliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive surveyFully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile CommunicationsEfficient proxy signcryption scheme with provable CCA and CMA securitySETLA: Signature and Encryption from LatticesGeneric construction of public key encryption, identity-based encryption and signcryption with equality testA fully secure lattice-based signcryption with designated equality test in standard modelA code-based hybrid signcryption schemeApplications of timed-release encryption with implicit authenticationFully anonymous identity-based broadcast signcryption with public verificationOn elliptic curve $L$-functions integrated encryption schemeOne-Round Attribute-Based Key Exchange in the Multi-Party SettingGroup-oriented setting's multisigncryption scheme with threshold designcryptionSigncryption schemes with threshold unsigncryption, and applicationsIdentity-based aggregate signcryption in the standard model from multilinear mapsProvable certificateless generalized signcryption schemeAn efficient identity based generalized signcryption schemeAnalysis and improvement of authenticatable ring signcryption schemeSecure identity-based signcryption in the standard modelAn ID-based signcryption scheme with compartmented secret sharing for unsigncryptionSigncryption Schemes Based on the Diffie–Hellman ProblemHybrid SigncryptionConcealment and Its Applications to Authenticated EncryptionParallel SigncryptionApplications of SigncryptionA convertible multi-authenticated encryption scheme for group communicationsA Signcryption Scheme Based Learning with Errors over Rings Without TrapdoorConvertible multi-authenticated encryption schemeContinuous leakage-resilient certificate-based signcryption scheme and application in cloud computingSigncryption schemes with insider security in an ideal permutation modelA new threshold authenticated encryption scheme using labor-division signatureImprovement of Tseng et al.'s authenticated encryption scheme with message linkagesImprovement of digital signature with message recovery using self-certified public keys and its variantsProvable secure identity based generalized signcryption schemeIdentity Based Public Verifiable Signcryption SchemeFully Secure Threshold UnsigncryptionSigncryption from randomness recoverable public key encryptionECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted MessagePolicy controlled system with anonymityOn the Connection Between Signcryption and One-Pass Key EstablishmentProvably Secure (Broadcast) Homomorphic SigncryptionA lattice-based signcryption scheme without random oraclesCryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairingEfficient ID-Based Digital Signatures with Message RecoveryAn efficient public-key searchable encryption scheme secure against inside keyword guessing attacksCertificate-Based Generalized Ring Signcryption SchemeSecurity under message-derived keys: signcryption in iMessageAnalysing the HPKE standardAuthenticated encryption: relations among notions and analysis of the generic composition paradigmEfficient Identity-Based Signcryption in the Standard ModelIdentity-based authenticated encryption with identity confidentialityIdentity-Based Combined Public Key Schemes for Signature, Encryption, and SigncryptionCluster-Based Energy-Efficient Secure Routing in Wireless Sensor NetworksNew efficient and secure protocols for verifiable signature sharing and other applicationsAn efficient signcryption scheme with forward secrecy based on elliptic curveEfficient and Provably Secure Certificateless Multi-receiver SigncryptionThe Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure VersionPractical convertible authenticated encryption schemes using self-certified public keysA provably secure proxy signcryption scheme using bilinear pairingsConjugacy systems based on nonabelian factorization problems and their applications in cryptographyOn the Security of Tag-KEM for SigncryptionNew multivariate-based certificateless hybrid signcryption scheme for multi-recipientCombined schemes for signature and encryption: the public-key and the identity-based setting




This page was built for publication: