Self-generated-certificate public key encryption without pairing and its application
DOI10.1016/J.INS.2011.01.037zbMATH Open1218.68079OpenAlexW2042914455WikidataQ121364657 ScholiaQ121364657MaRDI QIDQ545362FDOQ545362
Kefei Chen, Junzuo Lai, Weidong Kou
Publication date: 22 June 2011
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2011.01.037
certificateless public key cryptographyad hoc wireless networksself-generated-certificate public key cryptography
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- A method for obtaining digital signatures and public-key cryptosystems
- Breaking the short certificateless signature scheme
- Generic constructions of identity-based and certificateless kEMs
- Security Proofs for Signature Schemes
- Identity-Based Cryptosystems and Signature Schemes
- How to share a secret
- New directions in cryptography
- Information Security and Privacy
- Efficient Identity-Based Encryption Without Random Oracles
- Cryptology and Network Security
- Public Key Cryptography - PKC 2006
- Advances in Cryptology - ASIACRYPT 2003
- Efficient signature generation by smart cards
- Cryptography. Theory and practice
- Efficient Certificateless Signature Schemes
- Information Security
- Applied Cryptography and Network Security
- Security of public-key cryptosystems based on Chebyshev polynomials
- Certificateless Signature Revisited
- Simulatability and security of certificateless threshold signatures
- Security of public key encryption technique based on multiple chaotic systems
- Certificateless undeniable signature scheme
- Public-key encryption with chaos
- Key Replacement Attack Against a Generic Construction of Certificateless Signature
- Certificateless threshold cryptosystem secure against chosen-ciphertext attack
- Computational Science and Its Applications β ICCSA 2004
- Public Key Cryptography - PKC 2006
Cited In (2)
Recommendations
- Self-Generated-Certificate Public Key Encryption Without Pairing π π
- Information Security π π
- Certificateless public key encryption: a new generic construction and two pairing-free schemes π π
- Strongly Secure Certificateless Public Key Encryption Without Pairing π π
- Advances in Cryptology - ASIACRYPT 2003 π π
- A new certificateless public key encryption scheme π π
- General and Efficient Certificateless Public Key Encryption Constructions π π
- Certificateless public key signature scheme without pairing π π
- Computational Science and Its Applications β ICCSA 2004 π π
- Certified public key encryption without pairing calculation using standard model π π
This page was built for publication: Self-generated-certificate public key encryption without pairing and its application
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q545362)