Information Security

From MaRDI portal
Publication:5493164


DOI10.1007/11556992zbMath1127.94358MaRDI QIDQ5493164

Joonsang Baek, Willy Susilo, Reihaneh Safavi-Naini

Publication date: 20 October 2006

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11556992


68P25: Data encryption (aspects in computer science)

94A62: Authentication, digital signatures and secret sharing


Related Items

A more efficient accountable authority IBE scheme under the DL assumption, Strongly Secure Certificateless Public Key Encryption Without Pairing, Chosen-Ciphertext Secure Proxy Re-encryption without Pairings, Certificateless Public Key Signature Schemes from Standard Algorithms, Provably secure certificateless proxy signature scheme in the standard model, Self-generated-certificate public key encryption without pairing and its application, Efficient certificateless threshold signatures without random oracles, Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings, Cryptanalysis of a certificateless signcryption scheme in the standard model, Certificateless public key encryption: a new generic construction and two pairing-free schemes, Certificateless cryptography with KGC trust level 3, Anonymous certificateless multi-receiver encryption scheme for smart community management systems, Simulatability and security of certificateless threshold signatures, Lattice-based certificateless encryption scheme, Distributed key generation for SM9-based systems, Privacy-preserving file sharing on cloud storage with certificateless signcryption, An efficient RSA-based certificateless public key encryption scheme, Cryptanalysis and improvement of a certificateless encryption scheme in the standard model, Provably secure certificate-based signature scheme without pairings, An improved certificateless strong key-insulated signature scheme in the standard model, Certificateless Proxy Re-Encryption Without Pairings, New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model, General Certificateless Encryption and Timed-Release Encryption, A Schnorr-Like Lightweight Identity-Based Signature Scheme, Certified Encryption Revisited