Efficient proxy signcryption scheme with provable CCA and CMA security
From MaRDI portal
Publication:623106
Recommendations
Cites work
- scientific article; zbMATH DE number 2085423 (Why is no real title available?)
- scientific article; zbMATH DE number 1186868 (Why is no real title available?)
- scientific article; zbMATH DE number 1304303 (Why is no real title available?)
- scientific article; zbMATH DE number 1088233 (Why is no real title available?)
- scientific article; zbMATH DE number 1107690 (Why is no real title available?)
- scientific article; zbMATH DE number 1942431 (Why is no real title available?)
- scientific article; zbMATH DE number 2081084 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- A method for obtaining digital signatures and public-key cryptosystems
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Advances in Cryptology - CRYPTO 2003
- An efficient signcryption scheme with forward secrecy based on elliptic curve
- Efficient and Provably Secure Multi-receiver Identity-Based Signcryption
- Hierarchical ID-Based Cryptography
- ID-Based Blind Signature and Ring Signature from Pairings
- Information Security and Cryptology - ICISC 2003
- New directions in cryptography
- Selected Areas in Cryptography
Cited in
(4)
This page was built for publication: Efficient proxy signcryption scheme with provable CCA and CMA security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q623106)