Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
From MaRDI portal
Publication:5451088
DOI10.1007/11593447_28zbMath1154.94449OpenAlexW1832688593WikidataQ63131680 ScholiaQ63131680MaRDI QIDQ5451088
Benoît Libert, Jean-Jacques Quisquater, Paulo S. L. M. Barreto, Noel McCullagh
Publication date: 18 March 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11593447_28
Related Items (39)
A secure anonymous proxy signcryption scheme ⋮ On the security of joint signature and encryption revisited ⋮ An efficient signcryption for data access control in cloud computing ⋮ Certificate-based signcryption with enhanced security features ⋮ Efficient traceable ring signature scheme without pairings ⋮ Signal-flow-based analysis of wireless security protocols ⋮ An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices ⋮ Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext ⋮ Forward-secure identity-based signature: security notions and construction ⋮ Certificateless message recovery signatures providing Girault's level-3 security ⋮ Two Notes on the Security of Certificateless Signatures ⋮ Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey ⋮ Traceable Identity-Based Group Signature ⋮ Forward-secure ID based digital signature scheme with forward-secure private key generator ⋮ Efficient IBS from a new assumption in the multivariate-quadratic setting ⋮ Fully anonymous identity-based broadcast signcryption with public verification ⋮ Identity-based aggregate signcryption in the standard model from multilinear maps ⋮ An efficient identity based generalized signcryption scheme ⋮ Secure identity-based signcryption in the standard model ⋮ A pairing-based publicly verifiable secret sharing scheme ⋮ ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message ⋮ An Efficient ID-Based Proxy Signature Scheme from Pairings ⋮ Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures ⋮ Multi-key Hierarchical Identity-Based Signatures ⋮ Secure administration of cryptographic role-based access control for large-scale cloud storage systems ⋮ A lattice-based signcryption scheme without random oracles ⋮ Efficient ID-Based Digital Signatures with Message Recovery ⋮ Establishing Trust on VANET Safety Messages ⋮ A Schnorr-Like Lightweight Identity-Based Signature Scheme ⋮ Efficient Identity-Based Signcryption in the Standard Model ⋮ Identity Based Group Signatures from Hierarchical Identity-Based Encryption ⋮ Identity-Based Deterministic Signature Scheme without Forking-Lemma ⋮ Identity-based authenticated encryption with identity confidentiality ⋮ Strong Forward Security in Identity-Based Signcryption ⋮ Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption ⋮ Identity-based signatures in standard model ⋮ Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption ⋮ Efficient and Provably Secure Certificateless Multi-receiver Signcryption ⋮ Digital Signatures
This page was built for publication: Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps