Signatures in hierarchical certificateless cryptography: efficient constructions and provable security
From MaRDI portal
Publication:726365
DOI10.1016/J.INS.2014.02.085zbMath1341.94024OpenAlexW1991745401MaRDI QIDQ726365
Bo Qin, Peng Zeng, Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer
Publication date: 8 July 2016
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2014.02.085
Related Items (3)
Efficient subtree-based encryption for fuzzy-entity data sharing ⋮ Certificateless one-pass and two-party authenticated key agreement protocol and its extensions ⋮ An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Delegation of signing rights using certificateless proxy signatures
- Efficient many-to-one authentication with certificateless aggregate signatures
- The Weil pairing, and its efficient calculation
- Simulatable certificateless two-party authenticated key agreement protocol
- Provably secure certificate-based signature scheme without pairings
- On security of a certificateless signcryption scheme
- Identity-Based Cryptosystems and Signature Schemes
- Compact Group Signatures Without Random Oracles
- Certificateless Signature Revisited
- Hierarchical ID-Based Cryptography
- Identity-Based Encryption from the Weil Pairing
- Information Security and Privacy
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Certificateless Encryption Schemes Strongly Secure in the Standard Model
- Multi-key Hierarchical Identity-Based Signatures
- Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
- Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Key Replacement Attack Against a Generic Construction of Certificateless Signature
- Cryptology and Network Security
- Applied Cryptography and Network Security
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: Signatures in hierarchical certificateless cryptography: efficient constructions and provable security