Public Key Cryptography – PKC 2004
From MaRDI portal
Publication:5901807
DOI10.1007/b95631zbMath1198.94079MaRDI QIDQ5901807
Publication date: 14 May 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b95631
94A60: Cryptography
Related Items
Reducing elliptic curve logarithms to logarithms in a finite field, Indifferentiable deterministic hashing to elliptic and hyperelliptic curves, Revocable Identity-Based Encryption Revisited: Security Model and Construction, Identity-based threshold decryption on access structure, Group-oriented setting's multisigncryption scheme with threshold designcryption, Provably secure threshold public-key encryption with adaptive security and short ciphertexts, An ID-based signcryption scheme with compartmented secret sharing for unsigncryption, Certificateless threshold signature secure in the standard model, Certificateless threshold signature scheme from bilinear maps, A new ring signature scheme with signer-admission property, Efficient dynamic threshold identity-based encryption with constant-size ciphertext, Identity-based chameleon hashing and signatures without key exposure, Efficient identity-based threshold decryption scheme from bilinear pairings, (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance, Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism, Still wrong use of pairings in cryptography, Certificateless threshold cryptosystem secure against chosen-ciphertext attack, All-in-one group-oriented cryptosystem based on bilinear pairing, Certificateless undeniable signature scheme, On Dynamic Distribution of Private Keys over MANETs, Adaptive-ID Secure Revocable Identity-Based Encryption