Information Security
From MaRDI portal
Publication:5493164
DOI10.1007/11556992zbMath1127.94358OpenAlexW4241272628MaRDI QIDQ5493164
Joonsang Baek, Willy Susilo, Reihaneh Safavi-Naini
Publication date: 20 October 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11556992
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (26)
A more efficient accountable authority IBE scheme under the DL assumption ⋮ Provably secure certificateless proxy signature scheme in the standard model ⋮ Lattice-based certificateless encryption scheme ⋮ Privacy-preserving file sharing on cloud storage with certificateless signcryption ⋮ Certificateless Proxy Re-Encryption Without Pairings ⋮ Simulatability and security of certificateless threshold signatures ⋮ An efficient RSA-based certificateless public key encryption scheme ⋮ Cryptanalysis and improvement of a certificateless encryption scheme in the standard model ⋮ Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings ⋮ Cryptanalysis of a certificateless signcryption scheme in the standard model ⋮ Certificateless encryption scheme with provable security in the standard model suitable for mobile devices ⋮ Certificateless public key encryption: a new generic construction and two pairing-free schemes ⋮ Certificateless Public Key Signature Schemes from Standard Algorithms ⋮ Provably secure certificate-based signature scheme without pairings ⋮ General Certificateless Encryption and Timed-Release Encryption ⋮ New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model ⋮ Self-generated-certificate public key encryption without pairing and its application ⋮ Efficient certificateless threshold signatures without random oracles ⋮ Certificateless cryptography with KGC trust level 3 ⋮ An improved certificateless strong key-insulated signature scheme in the standard model ⋮ Strongly Secure Certificateless Public Key Encryption Without Pairing ⋮ Distributed key generation for SM9-based systems ⋮ A Schnorr-Like Lightweight Identity-Based Signature Scheme ⋮ Certified Encryption Revisited ⋮ Anonymous certificateless multi-receiver encryption scheme for smart community management systems ⋮ Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
This page was built for publication: Information Security