Certificate-free \textit{ad hoc} anonymous authentication
From MaRDI portal
Publication:726164
Recommendations
Cites work
- scientific article; zbMATH DE number 1942438 (Why is no real title available?)
- scientific article; zbMATH DE number 2009971 (Why is no real title available?)
- scientific article; zbMATH DE number 2081086 (Why is no real title available?)
- scientific article; zbMATH DE number 3419184 (Why is no real title available?)
- 1-out-of-n Signatures from a Variety of Keys
- A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
- A Provably Secure Ring Signature Scheme in Certificateless Cryptography
- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)
- A lattice-based threshold ring signature scheme
- Advances in Cryptology - EUROCRYPT 2004
- An efficient existentially unforgeable signature scheme and its applications
- Applied Cryptography and Network Security
- Certificateless Signature Revisited
- Certificateless public key cryptography
- Certificateless threshold ring signature
- Efficient Identity Based Ring Signature
- Efficient Identity-Based Encryption Without Random Oracles
- ID-Based Blind Signature and Ring Signature from Pairings
- Identity Based Ring Signature: Why, How and What Next
- Identity-based cryptosystems and signature schemes
- Identity-based ring signatures from RSA
- Information Security and Privacy
- Information and Communications Security
- Progress in Cryptology - INDOCRYPT 2003
- Provably Secure Code-Based Threshold Ring Signatures
- Ring signature scheme based on multivariate public key cryptosystems
- Security arguments for digital signatures and blind signatures
- Theory of Cryptography
- Topics in Cryptology – CT-RSA 2005
Cited in
(10)- Certificate-free attribute authentication
- Lightweight anonymous authentication for ad hoc group: a ring signature approach
- A novel scheme of anonymous authentication on trust in pervasive social networking
- Anonymous identity-based identification scheme in ad-hoc groups without pairings
- Authenticating ad hoc networks by comparison of short digests
- Evolutionary trust scheme of certificate game in mobile cloud computing
- Information Security
- An efficient anonymous authentication scheme based on double authentication preventing signature for mobile healthcare crowd sensing
- Quantum private set intersection cardinality and its application to anonymous authentication
- Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05
This page was built for publication: Certificate-free \textit{ad hoc} anonymous authentication
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q726164)