scientific article; zbMATH DE number 2086700

From MaRDI portal
Publication:4737237

zbMath1055.94511MaRDI QIDQ4737237

Tal Rabin, Yevgeniy Dodis, Jee Hea An

Publication date: 11 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320083.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (66)

On the Joint Security of Encryption and Signature in EMVGeneric Construction of Chosen Ciphertext Secure Proxy Re-EncryptionReceiver-anonymity in rerandomizable RCCA-secure cryptosystems resolvedCertificateless signcryption scheme in the standard modelSeparating Computational and Statistical Differential Privacy in the Client-Server ModelCiphertext verification security of symmetric encryption schemesMulti-use and unidirectional identity-based proxy re-encryption schemesAnonymity in shared symmetric key primitivesChosen ciphertext secure keyed-homomorphic public-key cryptosystemsConstructing parallel long-message signcryption scheme from trapdoor permutationEfficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic CurvesA Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding TheoryImproved Identity-Based Online/Offline EncryptionOn the security of joint signature and encryption revisitedMulti-designated receiver signed public key encryptionKey regeneration-free ciphertext-policy attribute-based encryption and its applicationReconciling non-malleability with homomorphic encryptionBatch verification of short signaturesOne-Round Attribute-Based Key Exchange in the Multi-party SettingCryptanalysis of a signcryption scheme with fast online signing and short signcryptextAlmost tight multi-user security under adaptive corruptions \& leakages in the standard modelA CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash FunctionFormal Security Treatments for Signatures from Identity-Based EncryptionChosen ciphertext secure keyed two-level homomorphic encryptionChosen-ciphertext secure code-based threshold public key encryptions with short ciphertextShort signatures without random oracles and the SDH assumption in bilinear groupsCertificateless Public Key Signature Schemes from Standard AlgorithmsAlmost tight multi-user security under adaptive corruptions from LWE in the standard modelEfficient traceable signatures in the standard modelOne-Round Attribute-Based Key Exchange in the Multi-Party SettingA Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage SettingSigncryption schemes with threshold unsigncryption, and applicationsCertificate-based verifiably encrypted signatures from pairingsAnalysis and improvement of authenticatable ring signcryption schemeHybrid SigncryptionConcealment and Its Applications to Authenticated EncryptionParallel SigncryptionA Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-EncryptionPractical verifiably encrypted signatures without random oraclesSecurity of BLS and BGLS signatures in a multi-user settingA new framework for the design and analysis of identity-based identification schemesChosen Ciphertext Secure Keyed-Homomorphic Public-Key EncryptionSigncryption schemes with insider security in an ideal permutation modelThe TLS handshake protocol: A modular analysisEfficient Confirmer Signatures from the “Signature of a Commitment” ParadigmFully Secure Threshold UnsigncryptionSigncryption from randomness recoverable public key encryptionA Modular Security Analysis of the TLS Handshake ProtocolUnidirectional Chosen-Ciphertext Secure Proxy Re-encryptionAn identity-based strongly unforgeable signature without random oracles from bilinear pairingsOn the Connection Between Signcryption and One-Pass Key EstablishmentCryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairingProxy Re-signature Schemes Without Random OraclesCertificate-Based Generalized Ring Signcryption SchemeComputationally Sound Formalization of Rerandomizable RCCA Secure EncryptionSecurity under message-derived keys: signcryption in iMessageAuthenticated encryption: relations among notions and analysis of the generic composition paradigmEfficient Traceable Signatures in the Standard ModelRevisiting (R)CCA security and replay protectionSecurity proofs for identity-based identification and signature schemesIdentity-Based Combined Public Key Schemes for Signature, Encryption, and SigncryptionThe Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure VersionStrongly unforgeable ring signature scheme from lattices in the standard modelOn the Security of Tag-KEM for SigncryptionCombined schemes for signature and encryption: the public-key and the identity-based settingSignature and Access Control Policies for XML Documents




This page was built for publication: