Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
From MaRDI portal
Publication:497591
DOI10.1016/J.INS.2013.06.049zbMATH Open1336.94079OpenAlexW2035531873MaRDI QIDQ497591FDOQ497591
Authors: Guozheng Hu, Lansheng Han, Zhanqing Wang, Xiangsheng Xia
Publication date: 24 September 2015
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2013.06.049
Recommendations
- Two Notes on the Security of Certificateless Signatures
- Cryptanalysis and improvement of two provably secure certificateless signature schemes
- Certificateless signature scheme with security enhanced in the standard model
- An improved certificateless signature scheme secure in the standard model
- Security analysis and improvement of a certificateless signature scheme
public key replacement attackthreshold signaturecertificateless signaturemalicious-but-passive KGC attack
Cites Work
- Breaking the short certificateless signature scheme
- Identity-Based Cryptosystems and Signature Schemes
- Information Security and Privacy
- Cryptology and Network Security
- Certificateless public key cryptography
- Certificateless threshold ring signature
- Certificateless signature and proxy signature schemes from bilinear pairings
- Efficient Certificateless Signature Schemes
- Applied Cryptography and Network Security
- Certificateless signcryption scheme in the standard model
- A new provably secure certificateless short signature scheme
- An improved certificateless signature scheme secure in the standard model
- Certificateless Signature Revisited
- Efficient Identity-Based Signatures Secure in the Standard Model
- Efficient many-to-one authentication with certificateless aggregate signatures
- Simulatability and security of certificateless threshold signatures
- Certificateless undeniable signature scheme
- Information Security and Privacy
- Certificateless threshold signature scheme from bilinear maps
- Key Replacement Attack Against a Generic Construction of Certificateless Signature
- Two Notes on the Security of Certificateless Signatures
- Efficient certificateless threshold signatures without random oracles
- Cryptanalysis of a certificateless signcryption scheme in the standard model
Cited In (7)
- Threshold Schnorr with stateless deterministic signing from standard assumptions
- Simulatability and security of certificateless threshold signatures
- Information Security and Cryptology
- Improved threshold signatures, proactive secret sharing, and input certification from LSS isomorphisms
- Improvement of the Miyazaki-Takaragi threshold digital signature scheme
- Security analysis and improvement of a certificateless signature scheme
- Efficient certificateless threshold signatures without random oracles
This page was built for publication: Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q497591)