Publication:4413870

From MaRDI portal


zbMath1066.94554MaRDI QIDQ4413870

Florian Hess

Publication date: 21 July 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2595/25950310.htm


11T71: Algebraic coding theory; cryptography (number-theoretic aspects)

14G50: Applications to coding theory and cryptography of arithmetic geometry

94A62: Authentication, digital signatures and secret sharing


Related Items

One-Round Attribute-Based Key Exchange in the Multi-Party Setting, Digital Signatures, Formal Language Identity-based Cryptography, A strongly secure identity-based authenticated group key exchange protocol, Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves, Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption, Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures, Proxy Signatures Secure Against Proxy Key Exposure, Multi-key Hierarchical Identity-Based Signatures, Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles, On the Security of Online/Offline Signatures and Multisignatures from ACISP’06, Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups, The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version, Identity-based signature and extended forking algorithm in the multivariate quadratic setting, Combined schemes for signature and encryption: the public-key and the identity-based setting, On the security of two identity-based signature schemes based on pairings, A provable secure fuzzy identity based signature scheme, An improved two-party identity-based authenticated key agreement protocol using pairings, Creation of identity-based digital signature schemes from bilinear maps, Simplified small exponent test for batch verification, Forward-secure identity-based signature: security notions and construction, Identity-based trapdoor mercurial commitments and applications, An identity-based strongly unforgeable signature without random oracles from bilinear pairings, Attribute-based key-insulated signature and its applications, Black-box constructions of signature schemes in the bounded leakage setting, Identity-based chameleon hashing and signatures without key exposure, A new framework for the design and analysis of identity-based identification schemes, Security proofs for identity-based identification and signature schemes, An efficient online/offline ID-based short signature procedure using extended chaotic maps, A secure cross-chain transaction model based on quantum multi-signature, Efficient traceable ring signature scheme without pairings, Forward-secure ID based digital signature scheme with forward-secure private key generator, Secure and efficient delegation of elliptic-curve pairing, Identity-based signatures in standard model, Security weaknesses of a signature scheme and authenticated key agreement protocols, Certificateless undeniable signature scheme, Provably secure non-interactive key distribution based on pairings, Secure administration of cryptographic role-based access control for large-scale cloud storage systems, Certificateless signature and proxy signature schemes from bilinear pairings, Identity based group-oriented undeniable signature scheme, ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings, LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication, Linearly homomorphic signatures with designated combiner, One-Round Attribute-Based Key Exchange in the Multi-party Setting, Traceable Identity-Based Group Signature, Authenticated Group Key Agreement Protocol Without Pairing, Identity Based Group Signatures from Hierarchical Identity-Based Encryption, Improvement of identity-based threshold proxy signature scheme with known signers, A Provably Secure Ring Signature Scheme in Certificateless Cryptography, An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model, An Efficient ID-Based Proxy Signature Scheme from Pairings, Hash Functions from Sigma Protocols and Improvements to VSH, Practical Short Signature Batch Verification, A Schnorr-Like Lightweight Identity-Based Signature Scheme, A conference key distribution system