scientific article; zbMATH DE number 1088233
From MaRDI portal
Publication:4364550
zbMath1058.94524MaRDI QIDQ4364550
Publication date: 7 January 1998
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (82)
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing ⋮ An efficient and secure identity based multiple signatures scheme based on RSA ⋮ Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC ⋮ A new forward-secure authenticated encryption scheme with message linkages ⋮ A generic solution to realize public verifiability of signcryption ⋮ How to construct efficient signcryption schemes on elliptic curves ⋮ A secure anonymous proxy signcryption scheme ⋮ Privacy-preserving file sharing on cloud storage with certificateless signcryption ⋮ Analysis of improved signcryption scheme with key privacy ⋮ Vetted encryption ⋮ Constructing parallel long-message signcryption scheme from trapdoor permutation ⋮ On methods of shortening ElGamal-type signatures ⋮ A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory ⋮ On the security of joint signature and encryption revisited ⋮ An efficient signcryption for data access control in cloud computing ⋮ Certificate-based signcryption with enhanced security features ⋮ Signcryption with fast online signing and short signcryptext for secure and private mobile communication ⋮ One-Round Attribute-Based Key Exchange in the Multi-party Setting ⋮ Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext ⋮ Cryptanalysis of a certificateless signcryption scheme in the standard model ⋮ Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey ⋮ Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications ⋮ Efficient proxy signcryption scheme with provable CCA and CMA security ⋮ SETLA: Signature and Encryption from Lattices ⋮ Generic construction of public key encryption, identity-based encryption and signcryption with equality test ⋮ A fully secure lattice-based signcryption with designated equality test in standard model ⋮ A code-based hybrid signcryption scheme ⋮ Applications of timed-release encryption with implicit authentication ⋮ Fully anonymous identity-based broadcast signcryption with public verification ⋮ On elliptic curve $L$-functions integrated encryption scheme ⋮ One-Round Attribute-Based Key Exchange in the Multi-Party Setting ⋮ Group-oriented setting's multisigncryption scheme with threshold designcryption ⋮ Signcryption schemes with threshold unsigncryption, and applications ⋮ Identity-based aggregate signcryption in the standard model from multilinear maps ⋮ Provable certificateless generalized signcryption scheme ⋮ An efficient identity based generalized signcryption scheme ⋮ Analysis and improvement of authenticatable ring signcryption scheme ⋮ Secure identity-based signcryption in the standard model ⋮ An ID-based signcryption scheme with compartmented secret sharing for unsigncryption ⋮ Signcryption Schemes Based on the Diffie–Hellman Problem ⋮ Hybrid Signcryption ⋮ Concealment and Its Applications to Authenticated Encryption ⋮ Parallel Signcryption ⋮ Applications of Signcryption ⋮ A convertible multi-authenticated encryption scheme for group communications ⋮ A Signcryption Scheme Based Learning with Errors over Rings Without Trapdoor ⋮ Convertible multi-authenticated encryption scheme ⋮ Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing ⋮ Signcryption schemes with insider security in an ideal permutation model ⋮ A new threshold authenticated encryption scheme using labor-division signature ⋮ Improvement of Tseng et al.'s authenticated encryption scheme with message linkages ⋮ Improvement of digital signature with message recovery using self-certified public keys and its variants ⋮ Provable secure identity based generalized signcryption scheme ⋮ Identity Based Public Verifiable Signcryption Scheme ⋮ Fully Secure Threshold Unsigncryption ⋮ Signcryption from randomness recoverable public key encryption ⋮ ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message ⋮ Policy controlled system with anonymity ⋮ On the Connection Between Signcryption and One-Pass Key Establishment ⋮ Provably Secure (Broadcast) Homomorphic Signcryption ⋮ A lattice-based signcryption scheme without random oracles ⋮ Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing ⋮ Efficient ID-Based Digital Signatures with Message Recovery ⋮ An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks ⋮ Certificate-Based Generalized Ring Signcryption Scheme ⋮ Security under message-derived keys: signcryption in iMessage ⋮ Analysing the HPKE standard ⋮ Authenticated encryption: relations among notions and analysis of the generic composition paradigm ⋮ Efficient Identity-Based Signcryption in the Standard Model ⋮ Identity-based authenticated encryption with identity confidentiality ⋮ Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption ⋮ Cluster-Based Energy-Efficient Secure Routing in Wireless Sensor Networks ⋮ New efficient and secure protocols for verifiable signature sharing and other applications ⋮ An efficient signcryption scheme with forward secrecy based on elliptic curve ⋮ Efficient and Provably Secure Certificateless Multi-receiver Signcryption ⋮ The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version ⋮ Practical convertible authenticated encryption schemes using self-certified public keys ⋮ A provably secure proxy signcryption scheme using bilinear pairings ⋮ Conjugacy systems based on nonabelian factorization problems and their applications in cryptography ⋮ On the Security of Tag-KEM for Signcryption ⋮ New multivariate-based certificateless hybrid signcryption scheme for multi-recipient ⋮ Combined schemes for signature and encryption: the public-key and the identity-based setting
This page was built for publication: