Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt”
From MaRDI portal
Publication:5300945
Recommendations
- Information Security
- On the Connection Between Signcryption and One-Pass Key Establishment
- On the joint security of encryption and signature, revisited
- Relations Among Security Notions for Undeniable Signature Schemes
- Signcryption schemes with threshold unsigncryption, and applications
- scientific article; zbMATH DE number 1962144
- Confidential Signatures and Deterministic Signcryption
- Invisible sanitizable signatures and public-key encryption are equivalent
- Constructions of signcryption in the multi-user setting from identity-based encryption
- On the security notions for homomorphic signatures
Cited in
(7)- Privacy for Private Key in Signatures
- Sign-then-encrypt with security enhancement and compressed ciphertext
- Information Security
- CASE: a new frontier in public-key authenticated encryption
- Orthogonality between Key Privacy and Data Privacy, Revisited
- Anonymous signcryption against linear related-key attacks
- On the Connection Between Signcryption and One-Pass Key Establishment
This page was built for publication: Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt”
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5300945)