Certificateless threshold ring signature
From MaRDI portal
Publication:730948
DOI10.1016/j.ins.2009.06.017zbMath1170.94327OpenAlexW2009265206MaRDI QIDQ730948
Duncan S. Wong, Shuang Chang, Yi Mu, Zhenfeng Zhang
Publication date: 1 October 2009
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2009.06.017
security modeldigital signatureanonymitycertificateless cryptographyring signaturepairing based cryptosystem
Related Items
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing, Certificateless ring signature based on RSA problem and DL problem, One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity, Certificateless threshold signature scheme from bilinear maps, Forward-secure identity-based signature: security notions and construction, Cryptanalysis of a certificateless signcryption scheme in the standard model, Group-oriented fair exchange of signatures, Two extensions of the ring signature scheme of Rivest-Shamir-Taumann, Concurrent signature without random oracles, Certificateless threshold signature secure in the standard model, Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model, Notes on the security of certificateless aggregate signature schemes, A certificateless ring signature scheme with high efficiency in the random oracle model, An ideal multi-secret sharing scheme based on MSP, Simulatable certificateless two-party authenticated key agreement protocol, Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism, A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges, Certificate-free \textit{ad hoc} anonymous authentication, Efficient Certificateless Proxy Signature Scheme, Black-box constructions of signature schemes in the bounded leakage setting, Practical (fully) distributed signatures provably secure in the standard model
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Simulatability and security of certificateless threshold signatures
- A new ring signature scheme with signer-admission property
- On the relation among various security models for certificateless cryptography
- Breaking the short certificateless signature scheme
- Efficient signature generation by smart cards
- Certificateless signature: a new security model and an improved generic construction
- Certificateless threshold cryptosystem secure against chosen-ciphertext attack
- Certificateless undeniable signature scheme
- How to share a secret
- A Provably Secure Ring Signature Scheme in Certificateless Cryptography
- Efficient Identity Based Ring Signature
- Generic Certificateless Key Encapsulation Mechanism
- Certificateless Signature Revisited
- 1-out-of-n Signatures from a Variety of Keys
- ID-Based Blind Signature and Ring Signature from Pairings
- Advances in Cryptology - EUROCRYPT 2004
- On the Security Models of (Threshold) Ring Signature Schemes
- Identity Based Threshold Ring Signature
- Topics in Cryptology – CT-RSA 2005
- Information Security and Cryptology - ICISC 2003
- Key Replacement Attack Against a Generic Construction of Certificateless Signature
- Cryptology and Network Security
- Theory of Cryptography
- Applied Cryptography and Network Security
- Advances in Cryptology - ASIACRYPT 2003