Efficient proxy signcryption scheme with provable CCA and CMA security
From MaRDI portal
Publication:623106
DOI10.1016/J.CAMWA.2010.07.015zbMATH Open1205.68150OpenAlexW2061597927WikidataQ115100068 ScholiaQ115100068MaRDI QIDQ623106FDOQ623106
Authors: Sumit K. Garg
Publication date: 13 February 2011
Published in: Computers & Mathematics with Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.camwa.2010.07.015
Recommendations
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- A method for obtaining digital signatures and public-key cryptosystems
- A public key cryptosystem and a signature scheme based on discrete logarithms
- New directions in cryptography
- Title not available (Why is that?)
- Hierarchical ID-Based Cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- An efficient signcryption scheme with forward secrecy based on elliptic curve
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- Title not available (Why is that?)
- Efficient and Provably Secure Multi-receiver Identity-Based Signcryption
- Selected Areas in Cryptography
- Title not available (Why is that?)
- Information Security and Cryptology - ICISC 2003
- ID-Based Blind Signature and Ring Signature from Pairings
Cited In (4)
This page was built for publication: Efficient proxy signcryption scheme with provable CCA and CMA security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q623106)