Notes on the security of certificateless aggregate signature schemes
From MaRDI portal
Publication:508661
DOI10.1016/J.INS.2014.07.019zbMATH Open1355.94078OpenAlexW2040987689MaRDI QIDQ508661FDOQ508661
Authors: Limin Shen, Ge Wu, Futai Zhang
Publication date: 7 February 2017
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2014.07.019
Recommendations
- Cryptanalysis and improvement of a certificateless aggregate signature scheme
- Cryptanalysis and improvement of three certificateless aggregate signature schemes
- Cryptanalysis and Improvement for Certificateless Aggregate Signature
- Certificateless aggregate signature scheme secure against fully chosen-key attacks
- Insecurity of an efficient certificateless aggregate signature with constant pairing computations
Cites Work
- Cryptology and Network Security
- Certificateless public key cryptography
- Certificateless threshold ring signature
- Title not available (Why is that?)
- Applied Cryptography and Network Security
- Certificateless signcryption scheme in the standard model
- Certificateless signature: a new security model and an improved generic construction
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- Advances in Cryptology - EUROCRYPT 2004
- Efficient many-to-one authentication with certificateless aggregate signatures
- Public Key Cryptography - PKC 2006
- Certificateless threshold signature scheme from bilinear maps
- Cryptology and Network Security
- Cryptanalysis of a certificateless signcryption scheme in the standard model
- An efficient certificateless aggregate signature with constant pairing computations
Cited In (10)
- Cryptanalysis and Improvement for Certificateless Aggregate Signature
- Insecurity of an efficient certificateless aggregate signature with constant pairing computations
- Two Notes on the Security of Certificateless Signatures
- Cryptanalysis and improvement of three certificateless aggregate signature schemes
- Title not available (Why is that?)
- Cryptology and Network Security
- Attribute-based signcryption scheme based on linear codes
- Certificateless aggregate signature scheme secure against fully chosen-key attacks
- Title not available (Why is that?)
- Cryptanalysis and improvement of a certificateless aggregate signature scheme
This page was built for publication: Notes on the security of certificateless aggregate signature schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q508661)