Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt”
From MaRDI portal
Publication:5300945
DOI10.1007/978-3-642-39059-3_13zbMATH Open1316.94105OpenAlexW1531115682MaRDI QIDQ5300945FDOQ5300945
Authors: Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo
Publication date: 28 June 2013
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://ro.uow.edu.au/cgi/viewcontent.cgi?article=2331&context=eispapers
Recommendations
- Information Security
- On the Connection Between Signcryption and One-Pass Key Establishment
- On the joint security of encryption and signature, revisited
- Relations Among Security Notions for Undeniable Signature Schemes
- Signcryption schemes with threshold unsigncryption, and applications
- scientific article; zbMATH DE number 1962144
- Confidential Signatures and Deterministic Signcryption
- Invisible sanitizable signatures and public-key encryption are equivalent
- Constructions of signcryption in the multi-user setting from identity-based encryption
- On the security notions for homomorphic signatures
Cited In (7)
- Privacy for Private Key in Signatures
- Information Security
- On the Connection Between Signcryption and One-Pass Key Establishment
- CASE: a new frontier in public-key authenticated encryption
- Anonymous signcryption against linear related-key attacks
- Sign-then-encrypt with security enhancement and compressed ciphertext
- Orthogonality between Key Privacy and Data Privacy, Revisited
This page was built for publication: Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt”
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5300945)