scientific article; zbMATH DE number 2009961
From MaRDI portal
Publication:4434881
zbMath1037.68533MaRDI QIDQ4434881
Publication date: 26 November 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2656/26560272.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items
Efficient Certificate-Based Signature and Its Aggregation, An Efficient and Provably Secure Certificate-Based Encryption Scheme, Private Certificate-Based Remote Data Integrity Checking in Public Clouds, Certificate-based signcryption with enhanced security features, Accountable identity-based encryption with distributed private key generators, Efficient revocable identity-based encryption via subset difference methods, Adaptively secure certificate-based broadcast encryption and its application to cloud storage service, Unnamed Item, An improved ring signature scheme without trusted key generation center for wireless sensor network, Security weakness of a certificate-based proxy signature scheme for IIoT environments, Towards Certificate-Based Group Encryption, Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications, Generic constructions of identity-based and certificateless kEMs, Anonymous certificate-based broadcast encryption with constant decryption cost, Certificateless Public Key Signature Schemes from Standard Algorithms, Notes on a provably-secure certificate-based encryption against malicious CA attacks, Provably secure certificate-based encryption with leakage resilience, Provably secure certificate-based proxy blind signature scheme from pairings, Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters, Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme, (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance, Provably secure certificate-based signature scheme without pairings, Certificate-based verifiably encrypted signatures from pairings, Efficient Certificate-Based Encryption in the Standard Model, Certificate-Based Signature Schemes without Pairings or Random Oracles, Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments, Certificate-based proxy decryption systems with revocability in the standard model, Revocable Identity-Based Encryption Revisited: Security Model and Construction, Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing, Continuous leakage-resilient certificate-based encryption, Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures, A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model, Symmetric threshold multipath (STM): an online symmetric key management scheme, A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power, Certificate-Based Generalized Ring Signcryption Scheme, Asymmetric Group Key Agreement, Distributed key generation for SM9-based systems, Certified Encryption Revisited, Conjunctive Broadcast and Attribute-Based Encryption, Unnamed Item, An efficient certificate-based signature scheme in the standard model