Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves
From MaRDI portal
Publication:5069714
Cites work
- scientific article; zbMATH DE number 1942431 (Why is no real title available?)
- scientific article; zbMATH DE number 1951619 (Why is no real title available?)
- scientific article; zbMATH DE number 2009970 (Why is no real title available?)
- scientific article; zbMATH DE number 2086699 (Why is no real title available?)
- scientific article; zbMATH DE number 2086700 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- scientific article; zbMATH DE number 1418310 (Why is no real title available?)
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- How to share a secret
- How to withstand mobile virus attacks (extended abstract)
- Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
- Identity-Based Key-Insulated Signature with Secure Key-Updates
- Identity-based cryptosystems and signature schemes
- Information and Communications Security
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
- Public Key Cryptography - PKC 2006
- Security arguments for digital signatures and blind signatures
- Strong Key-Insulated Signature Schemes
This page was built for publication: Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curves
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5069714)