Public Key Cryptography – PKC 2004

From MaRDI portal
Publication:5901808

DOI10.1007/b95631zbMath1198.94169OpenAlexW2482419090MaRDI QIDQ5901808

Reihaneh Safavi-Naini, Fangguo Zhang, Willy Susilo

Publication date: 14 May 2009

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b95631




Related Items (38)

On the security of two identity-based signature schemes based on pairingsProvably secure certificateless proxy signature scheme in the standard modelRevisiting key-alternating Feistel ciphers for shorter keys and multi-user securitySecure data storage in cloud: an e-stream cipher-based secure and dynamic updation policyCertificateless signature: a new security model and an improved generic constructionA pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumptionA new ring signature scheme with signer-admission propertyA fast and simple partially oblivious PRF, with applicationsAn efficient identity-based key exchange protocol with KGS forward secrecy for low-power devicesShort signatures without random oracles and the SDH assumption in bilinear groupsRing signature scheme based on multivariate public key cryptosystemsA round-optimal three-party ID-based authenticated key agreement protocolProvably secure server-aided verification signaturesSecurity weaknesses of a signature scheme and authenticated key agreement protocolsCertificateless signature scheme with security enhanced in the standard modelProvably secure and efficient proxy signature with untrustworthy proxy signerA provably secure short signature scheme based on discrete logarithmsCertificateless one-pass and two-party authenticated key agreement protocol and its extensionsA provable authenticated group key agreement protocol for mobile environmentEfficient Tate pairing computation using double-base chainsAn efficient ring signature scheme from pairingsEfficient Self-pairing on Ordinary Elliptic CurvesGeneric security-amplifying methods of ordinary digital signaturesIdentity-based trapdoor mercurial commitments and applicationsConstant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic GroupsArbitrated quantum signature with Hamiltonian algorithm based on blind quantum computationAn improved certificateless strong key-insulated signature scheme in the standard modelA Generic Construction for Universally-Convertible Undeniable SignaturesShort fail-stop signature scheme based on factorization and discrete logarithm assumptionsSecure Obfuscation of Encrypted Verifiable Encrypted SignaturesIdentity-Based Deterministic Signature Scheme without Forking-LemmaA new certificateless public key encryption schemeIdentity-based signatures in standard modelEfficient and Short Certificateless SignatureToward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based SignaturesServer-Aided Verification Signatures: Definitions and New ConstructionsA new deniable authentication protocol from bilinear pairingsDigital Signatures




This page was built for publication: Public Key Cryptography – PKC 2004