Advances in Cryptology - ASIACRYPT 2003

From MaRDI portal
Publication:5902399

DOI10.1007/b94617zbMath1205.94072OpenAlexW2899867281MaRDI QIDQ5902399

Kenneth G. Paterson, Sattam S. al-Riyami

Publication date: 5 January 2010

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b94617



Related Items

Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing, Efficient three-party authenticated key agreement protocol in certificateless cryptography, On CCA-Secure Somewhat Homomorphic Encryption, Registration-based encryption: removing private-key generator from IBE, Provably secure certificateless proxy signature scheme in the standard model, Lattice-based certificateless encryption scheme, Privacy-preserving file sharing on cloud storage with certificateless signcryption, Certificateless signcryption scheme in the standard model, Secure and efficient protection of consumer privacy in advanced metering infrastructure supporting fine-grained data analysis, Certificateless signature: a new security model and an improved generic construction, Optimizing registration based encryption, Survey of information security, Certificateless ring signature based on RSA problem and DL problem, An Efficient and Provably Secure Certificate-Based Encryption Scheme, Simulatability and security of certificateless threshold signatures, Certificate-based signcryption with enhanced security features, An efficient certificateless two-party authenticated key agreement protocol, Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited, Accountable identity-based encryption with distributed private key generators, A query privacy-enhanced and secure search scheme over encrypted data in cloud computing, Certificateless aggregate signature scheme secure against fully chosen-key attacks, Forgery attacks on two provably secure certificateless signature schemes, Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing, An efficient RSA-based certificateless public key encryption scheme, Distributed certificateless key encapsulation mechanism secure against the adaptive adversary, An improved ring signature scheme without trusted key generation center for wireless sensor network, Provably secure and efficient certificateless authenticated tripartite key agreement protocol, A novel pairing-free certificateless authenticated key agreement protocol with provable security, Cryptanalysis and improvement of a certificateless encryption scheme in the standard model, KCI-resilient anonymous wireless link-layer authentication protocols, A short non-delegatable strong designated verifier signature, Certificateless key-insulated signature without random oracles, Certificateless threshold signature scheme from bilinear maps, Cryptanalysis of a certificateless signcryption scheme in the standard model, Certificateless strong key-insulated signature without random oracles, Certificateless message recovery signatures providing Girault's level-3 security, A new two-round certificateless authenticated key agreement protocol without bilinear pairings, Generic constructions of identity-based and certificateless kEMs, A pairing-free and provably secure certificateless signature scheme, An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks, Certificateless public key encryption: a new generic construction and two pairing-free schemes, Certificateless public key encryption with equality test, Provably secure certificate-based encryption with leakage resilience, Delegation of signing rights using certificateless proxy signatures, Provably secure certificate-based proxy blind signature scheme from pairings, A new certificateless multiple key agreement scheme, A new provably secure certificateless short signature scheme, An anonymous authentication scheme in VANETs of smart city based on certificateless group signature, Efficient certificateless proxy signature scheme with provable security, Unrestricted and compact certificateless aggregate signature scheme, Certificateless proxy signature from RSA, Strongly secure certificateless signature scheme supporting batch verification, Provably secure certificate-based signature scheme without pairings, Certificateless public key encryption scheme with hybrid problems and its application to Internet of things, Efficient certificateless anonymous multi-receiver encryption scheme without bilinear parings, Cryptanalysis and improvement of three certificateless aggregate signature schemes, Provable certificateless generalized signcryption scheme, Certificateless signature scheme with security enhanced in the standard model, An efficient certificateless proxy signature scheme without pairing, Secure and efficient delegation of elliptic-curve pairing, Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, Certificateless threshold signature secure in the standard model, Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model, Certificateless threshold cryptosystem secure against chosen-ciphertext attack, Certificateless undeniable signature scheme, Notes on the security of certificateless aggregate signature schemes, Certificateless one-pass and two-party authenticated key agreement protocol and its extensions, An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks, A provable authenticated group key agreement protocol for mobile environment, A certificateless ring signature scheme with high efficiency in the random oracle model, Cryptanalysis and improvement of a certificateless aggregate signature scheme, Security models for certificateless signature schemes revisited, Self-generated-certificate public key encryption without pairing and its application, Efficient certificateless threshold signatures without random oracles, Simulatable certificateless two-party authenticated key agreement protocol, Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism, Certificateless undeniable signatures from bilinear maps, Certificateless cryptography with KGC trust level 3, Security of self-certified signatures, Pitfalls in a server-aided authenticated group key establishment, Escrow free attribute-based signature with self-revealability, Comment on a certificateless one-pass and two-party authenticated key agreement protocol, A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model, Certificate-free \textit{ad hoc} anonymous authentication, Signatures in hierarchical certificateless cryptography: efficient constructions and provable security, Certificateless proxy multi-signature, Certificateless threshold ring signature, Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing, An improved certificateless strong key-insulated signature scheme in the standard model, Breaking the short certificateless signature scheme, Certificateless two-party authenticated key agreement scheme for smart grid, Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions, Distributed key generation for SM9-based systems, Identity-based encryption with security against the KGC: a formal model and its instantiations, Anonymous certificateless multi-receiver encryption scheme for smart community management systems, Black-box constructions of signature schemes in the bounded leakage setting, Lattice-based revocable certificateless signature, Certificateless signature and proxy signature schemes from bilinear pairings, Verifiable registration-based encryption, An efficient certificate-based signature scheme in the standard model, A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model, Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC, A Pairing-Less Identity-Based Blind Signature with Message Recovery Scheme for Cloud-Assisted Services, A more efficient accountable authority IBE scheme under the DL assumption, Efficient Certificate-Based Signature and Its Aggregation, Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority, Certificateless Proxy Re-Encryption Without Pairings, Towards Forward Security Properties for PEKS and IBE, Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes, Reducing elliptic curve logarithms to logarithms in a finite field, A Novel Certificateless Multi-signature Scheme over NTRU Lattices, Unnamed Item, Registered attribute-based encryption, Two Notes on the Security of Certificateless Signatures, A Provably Secure Ring Signature Scheme in Certificateless Cryptography, Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications, Certificateless encryption scheme with provable security in the standard model suitable for mobile devices, Certificateless Public Key Signature Schemes from Standard Algorithms, Lower bounds for the number of decryption updates in registration-based encryption, Secure-channel free certificateless searchable public key authenticated encryption with keyword search, Design of a Certificateless Designated Server Based Searchable Public Key Encryption Scheme, General Certificateless Encryption and Timed-Release Encryption, Efficient Certificate-Based Encryption in the Standard Model, Certificate-Based Signature Schemes without Pairings or Random Oracles, New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model, Efficient Certificateless KEM in the Standard Model, Tracing Malicious Proxies in Proxy Re-encryption, Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures, Randomness Reuse: Extensions and Improvements, Strongly Secure Certificateless Public Key Encryption Without Pairing, Certificate-Based Generalized Ring Signcryption Scheme, An efficient certificateless multi-receiver threshold decryption scheme, Certified Encryption Revisited, Escrow-free encryption supporting cryptographic workflow, Efficient and Short Certificateless Signature, Efficient and Provably Secure Certificateless Multi-receiver Signcryption, Unnamed Item, Unnamed Item, CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution