Public Key Cryptography – PKC 2004
From MaRDI portal
Publication:5901808
DOI10.1007/b95631zbMath1198.94169OpenAlexW2482419090MaRDI QIDQ5901808
Reihaneh Safavi-Naini, Fangguo Zhang, Willy Susilo
Publication date: 14 May 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b95631
Related Items (38)
On the security of two identity-based signature schemes based on pairings ⋮ Provably secure certificateless proxy signature scheme in the standard model ⋮ Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security ⋮ Secure data storage in cloud: an e-stream cipher-based secure and dynamic updation policy ⋮ Certificateless signature: a new security model and an improved generic construction ⋮ A pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumption ⋮ A new ring signature scheme with signer-admission property ⋮ A fast and simple partially oblivious PRF, with applications ⋮ An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices ⋮ Short signatures without random oracles and the SDH assumption in bilinear groups ⋮ Ring signature scheme based on multivariate public key cryptosystems ⋮ A round-optimal three-party ID-based authenticated key agreement protocol ⋮ Provably secure server-aided verification signatures ⋮ Security weaknesses of a signature scheme and authenticated key agreement protocols ⋮ Certificateless signature scheme with security enhanced in the standard model ⋮ Provably secure and efficient proxy signature with untrustworthy proxy signer ⋮ A provably secure short signature scheme based on discrete logarithms ⋮ Certificateless one-pass and two-party authenticated key agreement protocol and its extensions ⋮ A provable authenticated group key agreement protocol for mobile environment ⋮ Efficient Tate pairing computation using double-base chains ⋮ An efficient ring signature scheme from pairings ⋮ Efficient Self-pairing on Ordinary Elliptic Curves ⋮ Generic security-amplifying methods of ordinary digital signatures ⋮ Identity-based trapdoor mercurial commitments and applications ⋮ Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups ⋮ Arbitrated quantum signature with Hamiltonian algorithm based on blind quantum computation ⋮ An improved certificateless strong key-insulated signature scheme in the standard model ⋮ A Generic Construction for Universally-Convertible Undeniable Signatures ⋮ Short fail-stop signature scheme based on factorization and discrete logarithm assumptions ⋮ Secure Obfuscation of Encrypted Verifiable Encrypted Signatures ⋮ Identity-Based Deterministic Signature Scheme without Forking-Lemma ⋮ A new certificateless public key encryption scheme ⋮ Identity-based signatures in standard model ⋮ Efficient and Short Certificateless Signature ⋮ Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based Signatures ⋮ Server-Aided Verification Signatures: Definitions and New Constructions ⋮ A new deniable authentication protocol from bilinear pairings ⋮ Digital Signatures
This page was built for publication: Public Key Cryptography – PKC 2004