Certificate-free \textit{ad hoc} anonymous authentication
From MaRDI portal
Publication:726164
DOI10.1016/J.INS.2013.11.015zbMATH Open1341.94027OpenAlexW2008795051MaRDI QIDQ726164FDOQ726164
Authors: D. Kharzeev
Publication date: 8 July 2016
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2013.11.015
Recommendations
Cites Work
- Security arguments for digital signatures and blind signatures
- Identity-Based Cryptosystems and Signature Schemes
- Efficient Identity-Based Encryption Without Random Oracles
- Topics in Cryptology – CT-RSA 2005
- Certificateless public key cryptography
- Certificateless threshold ring signature
- Advances in Cryptology - EUROCRYPT 2004
- Title not available (Why is that?)
- Title not available (Why is that?)
- Applied Cryptography and Network Security
- An efficient existentially unforgeable signature scheme and its applications
- Efficient Identity Based Ring Signature
- Identity Based Ring Signature: Why, How and What Next
- Title not available (Why is that?)
- 1-out-of-n Signatures from a Variety of Keys
- Progress in Cryptology - INDOCRYPT 2003
- A lattice-based threshold ring signature scheme
- Certificateless Signature Revisited
- A Provably Secure Ring Signature Scheme in Certificateless Cryptography
- Identity-based ring signatures from RSA
- ID-Based Blind Signature and Ring Signature from Pairings
- Theory of Cryptography
- Information and Communications Security
- Title not available (Why is that?)
- Ring signature scheme based on multivariate public key cryptosystems
- A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
- Provably Secure Code-Based Threshold Ring Signatures
- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)
- Information Security and Privacy
Cited In (6)
- Information Security
- Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05
- Authenticating ad hoc networks by comparison of short digests
- Evolutionary trust scheme of certificate game in mobile cloud computing
- Certificate-free attribute authentication
- Quantum private set intersection cardinality and its application to anonymous authentication
This page was built for publication: Certificate-free \textit{ad hoc} anonymous authentication
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q726164)