scientific article; zbMATH DE number 1951619
From MaRDI portal
zbMath1066.94554MaRDI QIDQ4413870
Publication date: 21 July 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2595/25950310.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Tate pairingWeil pairingsupersingular elliptic curvessignature schemekey escrowidentity based signatures
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Applications to coding theory and cryptography of arithmetic geometry (14G50) Authentication, digital signatures and secret sharing (94A62)
Related Items
On the security of two identity-based signature schemes based on pairings, Improvement of identity-based threshold proxy signature scheme with known signers, A strongly secure identity-based authenticated group key exchange protocol, LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication, Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves, A provable secure fuzzy identity based signature scheme, Efficient traceable ring signature scheme without pairings, One-Round Attribute-Based Key Exchange in the Multi-party Setting, Forward-secure identity-based signature: security notions and construction, A Provably Secure Ring Signature Scheme in Certificateless Cryptography, Traceable Identity-Based Group Signature, An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model, An improved two-party identity-based authenticated key agreement protocol using pairings, Forward-secure ID based digital signature scheme with forward-secure private key generator, Identity-based signature and extended forking algorithm in the multivariate quadratic setting, Identity-based chameleon hashing and signatures without key exposure, One-Round Attribute-Based Key Exchange in the Multi-Party Setting, Linearly homomorphic signatures with designated combiner, Security weaknesses of a signature scheme and authenticated key agreement protocols, Creation of identity-based digital signature schemes from bilinear maps, Authenticated Group Key Agreement Protocol Without Pairing, Secure and efficient delegation of elliptic-curve pairing, Simplified small exponent test for batch verification, Certificateless undeniable signature scheme, A new framework for the design and analysis of identity-based identification schemes, An efficient online/offline ID-based short signature procedure using extended chaotic maps, Provably secure non-interactive key distribution based on pairings, An Efficient ID-Based Proxy Signature Scheme from Pairings, Hash Functions from Sigma Protocols and Improvements to VSH, Identity-based trapdoor mercurial commitments and applications, Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures, Proxy Signatures Secure Against Proxy Key Exposure, An identity-based strongly unforgeable signature without random oracles from bilinear pairings, Attribute-based key-insulated signature and its applications, Multi-key Hierarchical Identity-Based Signatures, Secure administration of cryptographic role-based access control for large-scale cloud storage systems, Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles, Practical Short Signature Batch Verification, A Schnorr-Like Lightweight Identity-Based Signature Scheme, Identity Based Group Signatures from Hierarchical Identity-Based Encryption, Security proofs for identity-based identification and signature schemes, Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption, Identity-based signatures in standard model, Black-box constructions of signature schemes in the bounded leakage setting, On the Security of Online/Offline Signatures and Multisignatures from ACISP’06, Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups, The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version, Certificateless signature and proxy signature schemes from bilinear pairings, Identity based group-oriented undeniable signature scheme, ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings, Digital Signatures, A secure cross-chain transaction model based on quantum multi-signature, A conference key distribution system, Formal Language Identity-based Cryptography, Combined schemes for signature and encryption: the public-key and the identity-based setting