Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps

From MaRDI portal
Publication:5451088

DOI10.1007/11593447_28zbMath1154.94449OpenAlexW1832688593WikidataQ63131680 ScholiaQ63131680MaRDI QIDQ5451088

Benoît Libert, Jean-Jacques Quisquater, Paulo S. L. M. Barreto, Noel McCullagh

Publication date: 18 March 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11593447_28




Related Items (39)

A secure anonymous proxy signcryption schemeOn the security of joint signature and encryption revisitedAn efficient signcryption for data access control in cloud computingCertificate-based signcryption with enhanced security featuresEfficient traceable ring signature scheme without pairingsSignal-flow-based analysis of wireless security protocolsAn efficient identity-based key exchange protocol with KGS forward secrecy for low-power devicesCryptanalysis of a signcryption scheme with fast online signing and short signcryptextForward-secure identity-based signature: security notions and constructionCertificateless message recovery signatures providing Girault's level-3 securityTwo Notes on the Security of Certificateless SignaturesElliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive surveyTraceable Identity-Based Group SignatureForward-secure ID based digital signature scheme with forward-secure private key generatorEfficient IBS from a new assumption in the multivariate-quadratic settingFully anonymous identity-based broadcast signcryption with public verificationIdentity-based aggregate signcryption in the standard model from multilinear mapsAn efficient identity based generalized signcryption schemeSecure identity-based signcryption in the standard modelA pairing-based publicly verifiable secret sharing schemeECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted MessageAn Efficient ID-Based Proxy Signature Scheme from PairingsConstruction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard SignaturesMulti-key Hierarchical Identity-Based SignaturesSecure administration of cryptographic role-based access control for large-scale cloud storage systemsA lattice-based signcryption scheme without random oraclesEfficient ID-Based Digital Signatures with Message RecoveryEstablishing Trust on VANET Safety MessagesA Schnorr-Like Lightweight Identity-Based Signature SchemeEfficient Identity-Based Signcryption in the Standard ModelIdentity Based Group Signatures from Hierarchical Identity-Based EncryptionIdentity-Based Deterministic Signature Scheme without Forking-LemmaIdentity-based authenticated encryption with identity confidentialityStrong Forward Security in Identity-Based SigncryptionIdentity-Based Combined Public Key Schemes for Signature, Encryption, and SigncryptionIdentity-based signatures in standard modelEfficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast EncryptionEfficient and Provably Secure Certificateless Multi-receiver SigncryptionDigital Signatures




This page was built for publication: Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps