Applied Cryptography and Network Security
From MaRDI portal
Publication:5899223
DOI10.1007/11767480zbMATH Open1151.94638OpenAlexW4211109874MaRDI QIDQ5899223FDOQ5899223
Authors: Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11767480
Recommendations
Cited In (46)
- Efficient Certificateless Signature Schemes
- Certificateless message recovery signatures providing Girault's level-3 security
- A new certificateless signature scheme without pairing
- Self-generated-certificate public key encryption without pairing and its application
- An efficient certificateless undeniable signature scheme
- Certificateless proxy multi-signature
- Certificateless threshold ring signature
- Breaking the short certificateless signature scheme
- Certificateless Public Key Signature Schemes from Standard Algorithms
- Certificate-free \textit{ad hoc} anonymous authentication
- A certificateless public key encryption based return routability protocol for next-generation IP mobility to enhance signalling security and reduce latency
- An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
- Provably secure certificateless proxy signature scheme in the standard model
- Certificateless public key cryptography
- An improved certificateless strong key-insulated signature scheme in the standard model
- Privacy-preserving file sharing on cloud storage with certificateless signcryption
- Simulatability and security of certificateless threshold signatures
- Delegation of signing rights using certificateless proxy signatures
- Efficient certificateless proxy signature scheme with provable security
- Efficient and Short Certificateless Signature
- Two Notes on the Security of Certificateless Signatures
- Certificateless threshold signature scheme from bilinear maps
- Efficient revocable certificateless signature against signing key exposure
- Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures
- Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited
- Certificateless signature: a new security model and an improved generic construction
- A pairing-free and provably secure certificateless signature scheme
- Information Security and Privacy
- Cryptology and Network Security
- Certificateless undeniable signatures from bilinear maps
- Black-box constructions of signature schemes in the bounded leakage setting
- Certificateless threshold signature secure in the standard model
- Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
- A new provably secure certificateless short signature scheme
- Security Mediated Certificateless Signatures
- Notes on the security of certificateless aggregate signature schemes
- Certificateless undeniable signature scheme
- Efficient and provably secure certificateless signature from bilinear pairings
- An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks
- Certificateless public key cryptography in the standard model
- A Provably Secure Ring Signature Scheme in Certificateless Cryptography
- Signatures in hierarchical certificateless cryptography: efficient constructions and provable security
- Certificateless key-insulated signature without random oracles
- Certificateless proxy signature from RSA
- Strongly secure certificateless signature scheme supporting batch verification
- Security models for certificateless signature schemes revisited
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5899223)