Cryptology and Network Security

From MaRDI portal
Publication:5898104


DOI10.1007/11599371zbMath1154.94459MaRDI QIDQ5898104

Willy Susilo, Xin-Yi Huang, Yi Mu, Fu-Tai Zhang

Publication date: 14 November 2006

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11599371


94A62: Authentication, digital signatures and secret sharing


Related Items

Unnamed Item, Unnamed Item, Efficient and Short Certificateless Signature, Certificateless Public Key Signature Schemes from Standard Algorithms, Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing, Delegation of signing rights using certificateless proxy signatures, Efficient certificateless proxy signature scheme with provable security, Certificateless threshold signature secure in the standard model, Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model, Notes on the security of certificateless aggregate signature schemes, Security models for certificateless signature schemes revisited, Self-generated-certificate public key encryption without pairing and its application, Certificateless key-insulated signature without random oracles, Certificateless threshold signature scheme from bilinear maps, Cryptanalysis of a certificateless signcryption scheme in the standard model, A new provably secure certificateless short signature scheme, Certificateless undeniable signatures from bilinear maps, Signatures in hierarchical certificateless cryptography: efficient constructions and provable security, Certificateless threshold ring signature, Certificateless signcryption scheme in the standard model, Breaking the short certificateless signature scheme, Certificateless proxy signature from RSA, Strongly secure certificateless signature scheme supporting batch verification, An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks, Privacy-preserving file sharing on cloud storage with certificateless signcryption, An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks, Provably secure certificate-based proxy blind signature scheme from pairings, Certificateless signature: a new security model and an improved generic construction, Provably secure certificate-based signature scheme without pairings, Certificateless threshold cryptosystem secure against chosen-ciphertext attack, New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model, Two Notes on the Security of Certificateless Signatures, Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures