Certificateless signcryption scheme in the standard model
From MaRDI portal
Publication:845333
DOI10.1016/j.ins.2009.10.011zbMath1179.94066OpenAlexW2075738473MaRDI QIDQ845333
Hua Ma, Xiangsong Zhang, Zhenhua Liu, Yu Pu Hu
Publication date: 28 January 2010
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2009.10.011
Related Items
Provably secure certificateless proxy signature scheme in the standard model ⋮ Certificate-based signcryption with enhanced security features ⋮ Certificateless threshold signature scheme from bilinear maps ⋮ Forward-secure identity-based signature: security notions and construction ⋮ Cryptanalysis of a certificateless signcryption scheme in the standard model ⋮ Group-oriented setting's multisigncryption scheme with threshold designcryption ⋮ Certificateless threshold signature secure in the standard model ⋮ Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model ⋮ Notes on the security of certificateless aggregate signature schemes ⋮ Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism ⋮ A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model ⋮ Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Simulatability and security of certificateless threshold signatures
- Secure public-key encryption scheme without random oracles
- Breaking the short certificateless signature scheme
- Generic constructions of identity-based and certificateless kEMs
- Certificateless threshold cryptosystem secure against chosen-ciphertext attack
- Certificateless undeniable signature scheme
- The random oracle methodology, revisited
- Two Notes on the Security of Certificateless Signatures
- Efficient Certificateless Signature Schemes
- Advances in Cryptology - EUROCRYPT 2004
- Information Security and Privacy
- Efficient Identity-Based Encryption Without Random Oracles
- Advances in Cryptology - CRYPTO 2003
- Certificateless Encryption Schemes Strongly Secure in the Standard Model
- Secure Proxy Multi-signature Scheme in the Standard Model
- Public Key Cryptography - PKC 2005
- Computational Science and Its Applications – ICCSA 2004
- Efficient Identity-Based Signatures Secure in the Standard Model
- Key Replacement Attack Against a Generic Construction of Certificateless Signature
- Cryptology and Network Security
- Public Key Cryptography - PKC 2006
- Advances in Cryptology - ASIACRYPT 2003