An ID-based signcryption scheme with compartmented secret sharing for unsigncryption
From MaRDI portal
Publication:477604
DOI10.1016/J.IPL.2014.08.002zbMATH Open1352.94033OpenAlexW2087013609MaRDI QIDQ477604FDOQ477604
Authors: Graham Enos, Yuliang Zheng
Publication date: 9 December 2014
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2014.08.002
Recommendations
Cites Work
- Identity-Based Cryptosystems and Signature Schemes
- How to share a secret
- The Arithmetic of Elliptic Curves
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Elliptic curves. Number theory and cryptography
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- How to construct efficient signcryption schemes on elliptic curves
- Biclique Cryptanalysis of the Full AES
- Public Key Cryptography – PKC 2004
- Information Security and Cryptology - ICISC 2003
- General secret sharing based on the Chinese remainder theorem with applications in e-voting
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (2)
This page was built for publication: An ID-based signcryption scheme with compartmented secret sharing for unsigncryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q477604)