Information Security and Privacy
From MaRDI portal
Publication:5315258
DOI10.1007/b98755zbMath1098.94635OpenAlexW4299784765WikidataQ56387667 ScholiaQ56387667MaRDI QIDQ5315258
Publication date: 7 September 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98755
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (26)
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing ⋮ Certificateless signcryption scheme in the standard model ⋮ Certificateless signature: a new security model and an improved generic construction ⋮ Simulatability and security of certificateless threshold signatures ⋮ Certificateless key-insulated signature without random oracles ⋮ Certificateless threshold signature scheme from bilinear maps ⋮ Cryptanalysis of a certificateless signcryption scheme in the standard model ⋮ A Provably Secure Ring Signature Scheme in Certificateless Cryptography ⋮ An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks ⋮ A new provably secure certificateless short signature scheme ⋮ Efficient certificateless proxy signature scheme with provable security ⋮ New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model ⋮ Certificateless threshold signature secure in the standard model ⋮ Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model ⋮ Certificateless threshold cryptosystem secure against chosen-ciphertext attack ⋮ Certificateless undeniable signature scheme ⋮ An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks ⋮ Security models for certificateless signature schemes revisited ⋮ Self-generated-certificate public key encryption without pairing and its application ⋮ Efficient certificateless threshold signatures without random oracles ⋮ Certificateless undeniable signatures from bilinear maps ⋮ Signatures in hierarchical certificateless cryptography: efficient constructions and provable security ⋮ Breaking the short certificateless signature scheme ⋮ Strongly Secure Certificateless Key Agreement ⋮ Efficient and Short Certificateless Signature ⋮ Certificateless signature and proxy signature schemes from bilinear pairings
This page was built for publication: Information Security and Privacy