Information Security and Privacy

From MaRDI portal
Publication:5315258


DOI10.1007/b98755zbMath1098.94635WikidataQ56387667 ScholiaQ56387667MaRDI QIDQ5315258

Pil Joong Lee, Dae Hyun Yum

Publication date: 7 September 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b98755


94A60: Cryptography

68P25: Data encryption (aspects in computer science)

94A62: Authentication, digital signatures and secret sharing


Related Items

Efficient and Short Certificateless Signature, Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing, Efficient certificateless proxy signature scheme with provable security, Certificateless threshold signature secure in the standard model, Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model, Security models for certificateless signature schemes revisited, Self-generated-certificate public key encryption without pairing and its application, Efficient certificateless threshold signatures without random oracles, Certificateless key-insulated signature without random oracles, Certificateless threshold signature scheme from bilinear maps, Cryptanalysis of a certificateless signcryption scheme in the standard model, A new provably secure certificateless short signature scheme, Certificateless undeniable signatures from bilinear maps, Signatures in hierarchical certificateless cryptography: efficient constructions and provable security, Certificateless signcryption scheme in the standard model, Simulatability and security of certificateless threshold signatures, Breaking the short certificateless signature scheme, An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks, An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks, Certificateless signature: a new security model and an improved generic construction, Certificateless threshold cryptosystem secure against chosen-ciphertext attack, Certificateless undeniable signature scheme, Certificateless signature and proxy signature schemes from bilinear pairings, New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model, Strongly Secure Certificateless Key Agreement, A Provably Secure Ring Signature Scheme in Certificateless Cryptography