You can sign but not decrypt: hierarchical integrated encryption and signature
From MaRDI portal
Publication:6134008
DOI10.1007/978-3-031-26553-2_4zbMATH Open1519.94204OpenAlexW4321349762MaRDI QIDQ6134008FDOQ6134008
Authors:
Publication date: 21 August 2023
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-26553-2_4
Recommendations
hierarchical identity-based encryptionkey delegationhierarchical integrated signature and encryption
Cites Work
- On the joint security of encryption and signature, revisited
- Compression in Finite Fields and Torus-Based Cryptography
- Title not available (Why is that?)
- Hierarchical ID-Based Cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Secure integration of asymmetric and symmetric encryption schemes
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - CRYPTO 2003
- Pairings for cryptographers
- Secure proxy signature schemes for delegation of signing rights
- Title not available (Why is that?)
- Short designated verifier proxy signatures
- Title not available (Why is that?)
- A secure identity-based multi-proxy signature scheme
- Zether: towards privacy in a smart contract world
Cited In (2)
This page was built for publication: You can sign but not decrypt: hierarchical integrated encryption and signature
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6134008)