Applied Cryptography and Network Security
From MaRDI portal
Publication:5899223
Recommendations
Cited in
(46)- Efficient Certificateless Signature Schemes
- Certificateless message recovery signatures providing Girault's level-3 security
- Self-generated-certificate public key encryption without pairing and its application
- A new certificateless signature scheme without pairing
- Certificateless proxy multi-signature
- Certificateless threshold ring signature
- An efficient certificateless undeniable signature scheme
- Breaking the short certificateless signature scheme
- Certificate-free \textit{ad hoc} anonymous authentication
- Certificateless Public Key Signature Schemes from Standard Algorithms
- A certificateless public key encryption based return routability protocol for next-generation IP mobility to enhance signalling security and reduce latency
- An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
- Provably secure certificateless proxy signature scheme in the standard model
- Simulatability and security of certificateless threshold signatures
- Privacy-preserving file sharing on cloud storage with certificateless signcryption
- An improved certificateless strong key-insulated signature scheme in the standard model
- Delegation of signing rights using certificateless proxy signatures
- Efficient certificateless proxy signature scheme with provable security
- Certificateless public key cryptography
- Efficient and Short Certificateless Signature
- Certificateless threshold signature scheme from bilinear maps
- Two Notes on the Security of Certificateless Signatures
- Efficient revocable certificateless signature against signing key exposure
- Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures
- Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited
- Certificateless signature: a new security model and an improved generic construction
- A pairing-free and provably secure certificateless signature scheme
- Certificateless undeniable signatures from bilinear maps
- Information Security and Privacy
- Black-box constructions of signature schemes in the bounded leakage setting
- Cryptology and Network Security
- Certificateless threshold signature secure in the standard model
- Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
- A new provably secure certificateless short signature scheme
- Notes on the security of certificateless aggregate signature schemes
- Security Mediated Certificateless Signatures
- Certificateless undeniable signature scheme
- An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks
- Efficient and provably secure certificateless signature from bilinear pairings
- Certificateless public key cryptography in the standard model
- A Provably Secure Ring Signature Scheme in Certificateless Cryptography
- Signatures in hierarchical certificateless cryptography: efficient constructions and provable security
- Certificateless key-insulated signature without random oracles
- Certificateless proxy signature from RSA
- Security models for certificateless signature schemes revisited
- Strongly secure certificateless signature scheme supporting batch verification
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5899223)