scientific article; zbMATH DE number 2086700
From MaRDI portal
Publication:4737237
zbMATH Open1055.94511MaRDI QIDQ4737237FDOQ4737237
Authors: Jee Hea An, Yevgeniy Dodis, Tal Rabin
Publication date: 11 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320083.htm
Title of this publication is not available (Why is that?)
Recommendations
- On the security of joint signature and encryption revisited
- On the joint security of encryption and signature, revisited
- Tightly secure signatures and public-key encryption
- Tightly Secure Signatures and Public-Key Encryption
- Security of signature schemes in a multi-user setting
- Verifiably encrypted signatures: security revisited and a new construction
- On the security of the Courtois-Finiasz-Sendrier signature
- On the joint security of encryption and signature in EMV
- Combined schemes for signature and encryption: the public-key and the identity-based setting
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (80)
- Signcryption schemes with insider security in an ideal permutation model
- Combined schemes for signature and encryption: the public-key and the identity-based setting
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- A black-box construction of strongly unforgeable signature scheme in the leakage setting
- Batch verification of short signatures
- Parallel signcryption
- Proxy Re-signature Schemes Without Random Oracles
- A new framework for the design and analysis of identity-based identification schemes
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- Formal Security Treatments for Signatures from Identity-Based Encryption
- Security proofs for identity-based identification and signature schemes
- Signcryption from randomness recoverable public key encryption
- The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version
- Ciphertext verification security of symmetric encryption schemes
- One-Round Attribute-Based Key Exchange in the Multi-Party Setting
- A Modular Security Analysis of the TLS Handshake Protocol
- Signcryption schemes with threshold unsigncryption, and applications
- Hybrid signcryption
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
- On the joint security of encryption and signature, revisited
- On the joint security of encryption and signature in EMV
- Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved
- Anonymity in shared symmetric key primitives
- Formal proofs for the security of signcryption
- Security for signcryption: the two-user model
- Identity-based combined public key schemes for signature, encryption, and signcryption
- A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
- Efficient Traceable Signatures in the Standard Model
- Certificateless signcryption scheme in the standard model
- Chosen ciphertext secure keyed-homomorphic public-key encryption
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- Key regeneration-free ciphertext-policy attribute-based encryption and its application
- Short signatures without random oracles and the SDH assumption in bilinear groups
- Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing
- The TLS handshake protocol: A modular analysis
- Multi-designated receiver signed public key encryption
- Efficient traceable signatures in the standard model
- Efficient constructions of signcryption schemes and signcryption composability
- Practical verifiably encrypted signatures without random oracles
- Security under message-derived keys: signcryption in iMessage
- Joint state composition theorems for public-key encryption and digital signature functionalities with local computation
- Title not available (Why is that?)
- One-round attribute-based key exchange in the multi-party setting
- Strongly unforgeable ring signature scheme from lattices in the standard model
- Revisiting (R)CCA security and replay protection
- On the security of joint signature and encryption revisited
- Almost tight multi-user security under adaptive corruptions \& leakages in the standard model
- Reconciling non-malleability with homomorphic encryption
- Title not available (Why is that?)
- Analysis and improvement of authenticatable ring signcryption scheme
- Concealment and its applications to authenticated encryption
- Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext
- Certificate-based verifiably encrypted signatures from pairings
- A note on obfuscation for cryptographic functionalities of secret-operation then public-encryption
- On the security of tag-KEM for signcryption
- An identity-based strongly unforgeable signature without random oracles from bilinear pairings
- Fully secure threshold unsigncryption
- Constructing parallel long-message signcryption scheme from trapdoor permutation
- Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption
- Security of BLS and BGLS signatures in a multi-user setting
- Title not available (Why is that?)
- On the Connection Between Signcryption and One-Pass Key Establishment
- CASE: a new frontier in public-key authenticated encryption
- Certificateless Public Key Signature Schemes from Standard Algorithms
- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function
- Separating computational and statistical differential privacy in the client-server model
- Certificate-based generalized ring signcryption scheme
- Almost tight multi-user security under adaptive corruptions from LWE in the standard model
- Improved identity-based online/offline encryption
- More efficient public-key cryptography with leakage and tamper resilience
- Fully homomorphic encryption beyond IND-CCA1 security: integrity through verifiability
- Symmetric signcryption and E2EE group messaging in Keybase
- Signature and access control policies for XML documents
- Chosen ciphertext secure keyed two-level homomorphic encryption
- Efficient confirmer signatures from the ``signature of a commitment paradigm
- Sign-then-encrypt with security enhancement and compressed ciphertext
- Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves
- Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext
- Cryptography and Coding
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4737237)