Efficient ID-Based Digital Signatures with Message Recovery
From MaRDI portal
Publication:5458495
DOI10.1007/978-3-540-76969-9_4zbMATH Open1282.94082OpenAlexW1518480730MaRDI QIDQ5458495FDOQ5458495
Authors: Ray-lin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto
Publication date: 15 April 2008
Published in: Cryptology and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-76969-9_4
Recommendations
- Financial Cryptography and Data Security
- Certificateless message recovery signatures providing Girault's level-3 security
- Publication:4502515
- Identity-based signatures from lattices: simpler, faster, shorter
- Provably secure and pairing-based strong designated verifier signature scheme with message recovery
Cites Work
- A method for obtaining digital signatures and public-key cryptosystems
- Security arguments for digital signatures and blind signatures
- Identity-based cryptosystems and signature schemes
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Title not available (Why is that?)
- Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
- Public Key Cryptography - PKC 2005
- Title not available (Why is that?)
- Title not available (Why is that?)
- Financial Cryptography and Data Security
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (8)
- A pairing-less identity-based blind signature with message recovery scheme for cloud-assisted services
- Certificateless message recovery signatures providing Girault's level-3 security
- Secret handshakes from ID-based message recovery signatures: a new generic approach
- Provably secure and pairing-based strong designated verifier signature scheme with message recovery
- Digital signature with message recovery using self-certified public keys and its variants
- Digital signatures
- Financial Cryptography and Data Security
- Identity-based signatures in standard model
This page was built for publication: Efficient ID-Based Digital Signatures with Message Recovery
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458495)