Certificate-free \textit{ad hoc} anonymous authentication
From MaRDI portal
Publication:726164
DOI10.1016/j.ins.2013.11.015zbMath1341.94027OpenAlexW2008795051MaRDI QIDQ726164
Publication date: 8 July 2016
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2013.11.015
Related Items
Quantum private set intersection cardinality and its application to anonymous authentication ⋮ Evolutionary trust scheme of certificate game in mobile cloud computing
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Certificateless threshold ring signature
- An efficient existentially unforgeable signature scheme and its applications
- Security arguments for digital signatures and blind signatures
- Ring signature scheme based on multivariate public key cryptosystems
- Identity-based ring signatures from RSA
- Identity-Based Cryptosystems and Signature Schemes
- A Provably Secure Ring Signature Scheme in Certificateless Cryptography
- A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
- A Lattice-Based Threshold Ring Signature Scheme
- Efficient Identity Based Ring Signature
- Certificateless Signature Revisited
- Identity Based Ring Signature: Why, How and What Next
- Provably Secure Code-Based Threshold Ring Signatures
- 1-out-of-n Signatures from a Variety of Keys
- ID-Based Blind Signature and Ring Signature from Pairings
- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)
- Advances in Cryptology - EUROCRYPT 2004
- Information Security and Privacy
- Efficient Identity-Based Encryption Without Random Oracles
- Progress in Cryptology - INDOCRYPT 2003
- Information and Communications Security
- Topics in Cryptology – CT-RSA 2005
- Theory of Cryptography
- Applied Cryptography and Network Security
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: Certificate-free \textit{ad hoc} anonymous authentication