Advances in Cryptology - EUROCRYPT 2004
From MaRDI portal
Publication:5307259
DOI10.1007/B97182zbMATH Open1120.94309OpenAlexW2477185671MaRDI QIDQ5307259FDOQ5307259
Authors: M. Bellare, Chanathip Namprempre, Gregory Neven
Publication date: 25 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b97182
Recommendations
- Security proofs for identity-based identification and signature schemes
- An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model
- A new framework for the design and analysis of identity-based identification schemes
- scientific article; zbMATH DE number 1951619
- Identity-based signatures in standard model
Cited In (49)
- A Schnorr-Like Lightweight Identity-Based Signature Scheme
- Identity-based signature and extended forking algorithm in the multivariate quadratic setting
- Identity based identification from algebraic coding theory
- Combined schemes for signature and encryption: the public-key and the identity-based setting
- Real Hidden Identity-Based Signatures
- A new framework for the design and analysis of identity-based identification schemes
- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)
- One-Round ID-Based Blind Signature Scheme without ROS Assumption
- Short identity-based signatures with tight security from lattices
- Shorter and faster identity-based signatures with tight security in the (Q)ROM from lattices
- Security proofs for identity-based identification and signature schemes
- A secure identity-based proxy multi-signature scheme
- Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles
- A round-optimal three-party ID-based authenticated key agreement protocol
- Multi-key Hierarchical Identity-Based Signatures
- The One-More Discrete Logarithm Assumption in the Generic Group Model
- A closer look at multiple forking: leveraging (in)dependence for a tighter bound
- Identity-based threshold signatures from isogenies
- Hash Functions from Sigma Protocols and Improvements to VSH
- Accelerating signature-based broadcast authentication for wireless sensor networks
- Twin-Beth: security under active and concurrent attacks for the Beth identity-based identification scheme
- Certificate-Based Signature Schemes without Pairings or Random Oracles
- Forward-secure identity-based signature: security notions and construction
- Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures
- Topics in Cryptology – CT-RSA 2004
- An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
- An improved ring signature scheme without trusted key generation center for wireless sensor network
- Vetted encryption
- DualRing: generic construction of ring signatures with efficient instantiations
- Provably Secure Identity Based Provable Data Possession
- Certificateless signature: a new security model and an improved generic construction
- Comment on: ``An efficient identity-based signature scheme with provable security
- Cryptography and Coding
- A characterization of chameleon hash functions and new, efficient designs
- An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model
- A More Natural Way to Construct Identity-Based Identification Schemes
- Multi-identity management for identity-based cryptography
- On the Theoretical Gap between Group Signatures with and without Unlinkability
- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
- A non-interactive deniable authentication scheme based on designated verifier proofs
- On the security of a modified Beth identity-based identification scheme
- Security analysis of an identity-based strongly unforgeable signature scheme
- Identity-based ring signatures from RSA
- Toward tight security of the Galindo-Garcia identity-based signature
- OrBit: OR-proof identity-based identification with tight security for (as low as) 1-bit loss
- Tight security for the generic construction of identity-based signature (in the multi-instance setting)
- Multiple point compression on elliptic curves
- A Pairing-free Provable Secure and Efficient Identity-based Identification Scheme with Anonymity
- Identity-based signatures in standard model
This page was built for publication: Advances in Cryptology - EUROCRYPT 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5307259)