Applied Cryptography and Network Security
From MaRDI portal
Publication:5899223
DOI10.1007/11767480zbMath1151.94638OpenAlexW4211109874MaRDI QIDQ5899223
Dengguo Feng, Jing Xu, Duncan S. Wong, Zhenfeng Zhang
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11767480
Related Items (34)
Provably secure certificateless proxy signature scheme in the standard model ⋮ A certificateless public key encryption based return routability protocol for next-generation IP mobility to enhance signalling security and reduce latency ⋮ Privacy-preserving file sharing on cloud storage with certificateless signcryption ⋮ Certificateless signature: a new security model and an improved generic construction ⋮ Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited ⋮ Certificateless key-insulated signature without random oracles ⋮ Certificateless threshold signature scheme from bilinear maps ⋮ Certificateless message recovery signatures providing Girault's level-3 security ⋮ Two Notes on the Security of Certificateless Signatures ⋮ A Provably Secure Ring Signature Scheme in Certificateless Cryptography ⋮ A pairing-free and provably secure certificateless signature scheme ⋮ An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks ⋮ Certificateless Public Key Signature Schemes from Standard Algorithms ⋮ Delegation of signing rights using certificateless proxy signatures ⋮ A new provably secure certificateless short signature scheme ⋮ Efficient certificateless proxy signature scheme with provable security ⋮ Certificateless proxy signature from RSA ⋮ Strongly secure certificateless signature scheme supporting batch verification ⋮ Certificateless threshold signature secure in the standard model ⋮ Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model ⋮ Notes on the security of certificateless aggregate signature schemes ⋮ An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks ⋮ Security models for certificateless signature schemes revisited ⋮ Self-generated-certificate public key encryption without pairing and its application ⋮ Certificateless undeniable signatures from bilinear maps ⋮ Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures ⋮ Certificate-free \textit{ad hoc} anonymous authentication ⋮ Signatures in hierarchical certificateless cryptography: efficient constructions and provable security ⋮ Certificateless proxy multi-signature ⋮ Certificateless threshold ring signature ⋮ An improved certificateless strong key-insulated signature scheme in the standard model ⋮ Breaking the short certificateless signature scheme ⋮ Black-box constructions of signature schemes in the bounded leakage setting ⋮ Efficient and Short Certificateless Signature
This page was built for publication: Applied Cryptography and Network Security