You can sign but not decrypt: hierarchical integrated encryption and signature
From MaRDI portal
Publication:6134008
Recommendations
Cites work
- scientific article; zbMATH DE number 1808281 (Why is no real title available?)
- scientific article; zbMATH DE number 1107690 (Why is no real title available?)
- scientific article; zbMATH DE number 1942423 (Why is no real title available?)
- scientific article; zbMATH DE number 2009960 (Why is no real title available?)
- scientific article; zbMATH DE number 2086725 (Why is no real title available?)
- A secure identity-based multi-proxy signature scheme
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - EUROCRYPT 2004
- Compression in Finite Fields and Torus-Based Cryptography
- Hierarchical ID-Based Cryptography
- On the joint security of encryption and signature, revisited
- Pairings for cryptographers
- Secure integration of asymmetric and symmetric encryption schemes
- Secure proxy signature schemes for delegation of signing rights
- Short designated verifier proxy signatures
- Zether: towards privacy in a smart contract world
Cited in
(2)
This page was built for publication: You can sign but not decrypt: hierarchical integrated encryption and signature
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6134008)