Applied Cryptography and Network Security

From MaRDI portal
Publication:5899223


DOI10.1007/11767480zbMath1151.94638MaRDI QIDQ5899223

Dengguo Feng, Jing Xu, Duncan S. Wong, Zhenfeng Zhang

Publication date: 2 May 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11767480


94A62: Authentication, digital signatures and secret sharing


Related Items

Efficient and Short Certificateless Signature, Certificateless Public Key Signature Schemes from Standard Algorithms, Provably secure certificateless proxy signature scheme in the standard model, Certificateless message recovery signatures providing Girault's level-3 security, Delegation of signing rights using certificateless proxy signatures, Efficient certificateless proxy signature scheme with provable security, Certificateless threshold signature secure in the standard model, Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model, Notes on the security of certificateless aggregate signature schemes, Security models for certificateless signature schemes revisited, Self-generated-certificate public key encryption without pairing and its application, Certificateless key-insulated signature without random oracles, Certificateless threshold signature scheme from bilinear maps, A new provably secure certificateless short signature scheme, Certificateless undeniable signatures from bilinear maps, Certificate-free \textit{ad hoc} anonymous authentication, Signatures in hierarchical certificateless cryptography: efficient constructions and provable security, Certificateless proxy multi-signature, Certificateless threshold ring signature, Black-box constructions of signature schemes in the bounded leakage setting, Breaking the short certificateless signature scheme, A certificateless public key encryption based return routability protocol for next-generation IP mobility to enhance signalling security and reduce latency, Certificateless proxy signature from RSA, Strongly secure certificateless signature scheme supporting batch verification, An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks, Privacy-preserving file sharing on cloud storage with certificateless signcryption, A pairing-free and provably secure certificateless signature scheme, An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks, Certificateless signature: a new security model and an improved generic construction, An improved certificateless strong key-insulated signature scheme in the standard model, Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited, Two Notes on the Security of Certificateless Signatures, A Provably Secure Ring Signature Scheme in Certificateless Cryptography, Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures