scientific article; zbMATH DE number 2086700
From MaRDI portal
Publication:4737237
zbMath1055.94511MaRDI QIDQ4737237
Tal Rabin, Yevgeniy Dodis, Jee Hea An
Publication date: 11 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320083.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (66)
On the Joint Security of Encryption and Signature in EMV ⋮ Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption ⋮ Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved ⋮ Certificateless signcryption scheme in the standard model ⋮ Separating Computational and Statistical Differential Privacy in the Client-Server Model ⋮ Ciphertext verification security of symmetric encryption schemes ⋮ Multi-use and unidirectional identity-based proxy re-encryption schemes ⋮ Anonymity in shared symmetric key primitives ⋮ Chosen ciphertext secure keyed-homomorphic public-key cryptosystems ⋮ Constructing parallel long-message signcryption scheme from trapdoor permutation ⋮ Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves ⋮ A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory ⋮ Improved Identity-Based Online/Offline Encryption ⋮ On the security of joint signature and encryption revisited ⋮ Multi-designated receiver signed public key encryption ⋮ Key regeneration-free ciphertext-policy attribute-based encryption and its application ⋮ Reconciling non-malleability with homomorphic encryption ⋮ Batch verification of short signatures ⋮ One-Round Attribute-Based Key Exchange in the Multi-party Setting ⋮ Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext ⋮ Almost tight multi-user security under adaptive corruptions \& leakages in the standard model ⋮ A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function ⋮ Formal Security Treatments for Signatures from Identity-Based Encryption ⋮ Chosen ciphertext secure keyed two-level homomorphic encryption ⋮ Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext ⋮ Short signatures without random oracles and the SDH assumption in bilinear groups ⋮ Certificateless Public Key Signature Schemes from Standard Algorithms ⋮ Almost tight multi-user security under adaptive corruptions from LWE in the standard model ⋮ Efficient traceable signatures in the standard model ⋮ One-Round Attribute-Based Key Exchange in the Multi-Party Setting ⋮ A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting ⋮ Signcryption schemes with threshold unsigncryption, and applications ⋮ Certificate-based verifiably encrypted signatures from pairings ⋮ Analysis and improvement of authenticatable ring signcryption scheme ⋮ Hybrid Signcryption ⋮ Concealment and Its Applications to Authenticated Encryption ⋮ Parallel Signcryption ⋮ A Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-Encryption ⋮ Practical verifiably encrypted signatures without random oracles ⋮ Security of BLS and BGLS signatures in a multi-user setting ⋮ A new framework for the design and analysis of identity-based identification schemes ⋮ Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption ⋮ Signcryption schemes with insider security in an ideal permutation model ⋮ The TLS handshake protocol: A modular analysis ⋮ Efficient Confirmer Signatures from the “Signature of a Commitment” Paradigm ⋮ Fully Secure Threshold Unsigncryption ⋮ Signcryption from randomness recoverable public key encryption ⋮ A Modular Security Analysis of the TLS Handshake Protocol ⋮ Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption ⋮ An identity-based strongly unforgeable signature without random oracles from bilinear pairings ⋮ On the Connection Between Signcryption and One-Pass Key Establishment ⋮ Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing ⋮ Proxy Re-signature Schemes Without Random Oracles ⋮ Certificate-Based Generalized Ring Signcryption Scheme ⋮ Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption ⋮ Security under message-derived keys: signcryption in iMessage ⋮ Authenticated encryption: relations among notions and analysis of the generic composition paradigm ⋮ Efficient Traceable Signatures in the Standard Model ⋮ Revisiting (R)CCA security and replay protection ⋮ Security proofs for identity-based identification and signature schemes ⋮ Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption ⋮ The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version ⋮ Strongly unforgeable ring signature scheme from lattices in the standard model ⋮ On the Security of Tag-KEM for Signcryption ⋮ Combined schemes for signature and encryption: the public-key and the identity-based setting ⋮ Signature and Access Control Policies for XML Documents
This page was built for publication: