Information Security and Privacy

From MaRDI portal
Publication:5315258

DOI10.1007/b98755zbMath1098.94635OpenAlexW4299784765WikidataQ56387667 ScholiaQ56387667MaRDI QIDQ5315258

Pil Joong Lee, Dae Hyun Yum

Publication date: 7 September 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b98755




Related Items (26)

Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairingCertificateless signcryption scheme in the standard modelCertificateless signature: a new security model and an improved generic constructionSimulatability and security of certificateless threshold signaturesCertificateless key-insulated signature without random oraclesCertificateless threshold signature scheme from bilinear mapsCryptanalysis of a certificateless signcryption scheme in the standard modelA Provably Secure Ring Signature Scheme in Certificateless CryptographyAn efficient certificateless aggregate signature without pairings for vehicular ad hoc networksA new provably secure certificateless short signature schemeEfficient certificateless proxy signature scheme with provable securityNew Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard ModelCertificateless threshold signature secure in the standard modelCryptanalysis and improvement of a certificateless threshold signature secure in the standard modelCertificateless threshold cryptosystem secure against chosen-ciphertext attackCertificateless undeniable signature schemeAn efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networksSecurity models for certificateless signature schemes revisitedSelf-generated-certificate public key encryption without pairing and its applicationEfficient certificateless threshold signatures without random oraclesCertificateless undeniable signatures from bilinear mapsSignatures in hierarchical certificateless cryptography: efficient constructions and provable securityBreaking the short certificateless signature schemeStrongly Secure Certificateless Key AgreementEfficient and Short Certificateless SignatureCertificateless signature and proxy signature schemes from bilinear pairings




This page was built for publication: Information Security and Privacy