Certificateless signcryption scheme in the standard model
From MaRDI portal
Publication:845333
DOI10.1016/J.INS.2009.10.011zbMATH Open1179.94066OpenAlexW2075738473MaRDI QIDQ845333FDOQ845333
Authors: Zhenhua Liu, Xiangsong Zhang, Hua Ma, Yupu Hu
Publication date: 28 January 2010
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2009.10.011
Recommendations
- Cryptanalysis of a certificateless signcryption scheme in the standard model
- Secure certificateless signcryption scheme without bilinear pairing
- Certificateless signature scheme with security enhanced in the standard model
- Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing
- Cryptanalysis and improvement of a certificateless encryption scheme in the standard model
Cites Work
- Breaking the short certificateless signature scheme
- Generic constructions of identity-based and certificateless kEMs
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Information Security and Privacy
- Efficient Identity-Based Encryption Without Random Oracles
- Cryptology and Network Security
- Public Key Cryptography - PKC 2006
- Certificateless public key cryptography
- The random oracle methodology, revisited.
- Efficient Certificateless Signature Schemes
- Certificateless Encryption Schemes Strongly Secure in the Standard Model
- Advances in Cryptology - CRYPTO 2003
- Public Key Cryptography - PKC 2005
- An improved certificateless signature scheme secure in the standard model
- Efficient Identity-Based Signatures Secure in the Standard Model
- Simulatability and security of certificateless threshold signatures
- Certificateless undeniable signature scheme
- Key Replacement Attack Against a Generic Construction of Certificateless Signature
- Two Notes on the Security of Certificateless Signatures
- Certificateless threshold cryptosystem secure against chosen-ciphertext attack
- Computational Science and Its Applications – ICCSA 2004
- Certificateless public key encryption secure against malicious KGC attacks in the standard model
- Secure public-key encryption scheme without random oracles
- Secure Proxy Multi-signature Scheme in the Standard Model
Cited In (25)
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
- Provable certificateless generalized signcryption scheme
- Certificateless signature scheme with security enhanced in the standard model
- A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model
- Security pitfalls of the certificateless signature and multi-receiver signcryption schemes
- A new certificateless multi-proxy signcryption scheme
- An efficient certificateless threshold signcryption scheme
- Group-oriented setting's multisigncryption scheme with threshold designcryption
- Provably secure certificateless proxy signature scheme in the standard model
- An improved certificateless signature scheme secure in the standard model
- Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing
- Certificateless hybrid signcryption
- Certificateless threshold signature scheme from bilinear maps
- Forward-secure identity-based signature: security notions and construction
- Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing
- Title not available (Why is that?)
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
- On security of a certificateless signcryption scheme
- Certificateless threshold signature secure in the standard model
- Certificate-based signcryption with enhanced security features
- Efficient and Provably Secure Certificateless Multi-receiver Signcryption
- Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
- Cryptanalysis of a certificateless signcryption scheme in the standard model
- Notes on the security of certificateless aggregate signature schemes
- Cryptanalysis of some signcryption schemes in the standard model
This page was built for publication: Certificateless signcryption scheme in the standard model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q845333)