Applied Cryptography and Network Security

From MaRDI portal
Publication:5899223

DOI10.1007/11767480zbMath1151.94638OpenAlexW4211109874MaRDI QIDQ5899223

Dengguo Feng, Jing Xu, Duncan S. Wong, Zhenfeng Zhang

Publication date: 2 May 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11767480




Related Items (34)

Provably secure certificateless proxy signature scheme in the standard modelA certificateless public key encryption based return routability protocol for next-generation IP mobility to enhance signalling security and reduce latencyPrivacy-preserving file sharing on cloud storage with certificateless signcryptionCertificateless signature: a new security model and an improved generic constructionPrivacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisitedCertificateless key-insulated signature without random oraclesCertificateless threshold signature scheme from bilinear mapsCertificateless message recovery signatures providing Girault's level-3 securityTwo Notes on the Security of Certificateless SignaturesA Provably Secure Ring Signature Scheme in Certificateless CryptographyA pairing-free and provably secure certificateless signature schemeAn efficient certificateless aggregate signature without pairings for vehicular ad hoc networksCertificateless Public Key Signature Schemes from Standard AlgorithmsDelegation of signing rights using certificateless proxy signaturesA new provably secure certificateless short signature schemeEfficient certificateless proxy signature scheme with provable securityCertificateless proxy signature from RSAStrongly secure certificateless signature scheme supporting batch verificationCertificateless threshold signature secure in the standard modelCryptanalysis and improvement of a certificateless threshold signature secure in the standard modelNotes on the security of certificateless aggregate signature schemesAn efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networksSecurity models for certificateless signature schemes revisitedSelf-generated-certificate public key encryption without pairing and its applicationCertificateless undeniable signatures from bilinear mapsCertificate-Based Signatures: New Definitions and a Generic Construction from Certificateless SignaturesCertificate-free \textit{ad hoc} anonymous authenticationSignatures in hierarchical certificateless cryptography: efficient constructions and provable securityCertificateless proxy multi-signatureCertificateless threshold ring signatureAn improved certificateless strong key-insulated signature scheme in the standard modelBreaking the short certificateless signature schemeBlack-box constructions of signature schemes in the bounded leakage settingEfficient and Short Certificateless Signature




This page was built for publication: Applied Cryptography and Network Security