Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications
From MaRDI portal
Publication:6101445
Cites work
- scientific article; zbMATH DE number 1088233 (Why is no real title available?)
- scientific article; zbMATH DE number 2009961 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A method for obtaining digital signatures and public-key cryptosystems
- A practical leakage-resilient signature scheme in the generic group model
- Bug Attacks
- Certificateless public key cryptography
- Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Leakage resilient ElGamal encryption
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority
- Leakage-resilient certificateless key encapsulation scheme
- Leakage-resilient revocable identity-based signature with cloud revocation authority
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
- Signature schemes with bounded leakage resilience
Cited in
(1)
This page was built for publication: Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6101445)