Certificateless signcryption scheme in the standard model
From MaRDI portal
Publication:845333
Recommendations
- Cryptanalysis of a certificateless signcryption scheme in the standard model
- Secure certificateless signcryption scheme without bilinear pairing
- Certificateless signature scheme with security enhanced in the standard model
- Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing
- Cryptanalysis and improvement of a certificateless encryption scheme in the standard model
Cites work
- scientific article; zbMATH DE number 2009960 (Why is no real title available?)
- scientific article; zbMATH DE number 2086700 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - EUROCRYPT 2004
- An improved certificateless signature scheme secure in the standard model
- Breaking the short certificateless signature scheme
- Certificateless Encryption Schemes Strongly Secure in the Standard Model
- Certificateless public key cryptography
- Certificateless public key encryption secure against malicious KGC attacks in the standard model
- Certificateless threshold cryptosystem secure against chosen-ciphertext attack
- Certificateless undeniable signature scheme
- Computational Science and Its Applications – ICCSA 2004
- Cryptology and Network Security
- Efficient Certificateless Signature Schemes
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient Identity-Based Signatures Secure in the Standard Model
- Generic constructions of identity-based and certificateless kEMs
- Information Security and Privacy
- Key Replacement Attack Against a Generic Construction of Certificateless Signature
- Public Key Cryptography - PKC 2005
- Public Key Cryptography - PKC 2006
- Secure Proxy Multi-signature Scheme in the Standard Model
- Secure public-key encryption scheme without random oracles
- Simulatability and security of certificateless threshold signatures
- The random oracle methodology, revisited.
- Two Notes on the Security of Certificateless Signatures
Cited in
(25)- Cryptanalysis of some signcryption schemes in the standard model
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
- Provable certificateless generalized signcryption scheme
- Certificateless signature scheme with security enhanced in the standard model
- A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model
- Security pitfalls of the certificateless signature and multi-receiver signcryption schemes
- A new certificateless multi-proxy signcryption scheme
- Group-oriented setting's multisigncryption scheme with threshold designcryption
- An efficient certificateless threshold signcryption scheme
- Provably secure certificateless proxy signature scheme in the standard model
- An improved certificateless signature scheme secure in the standard model
- Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing
- Certificateless hybrid signcryption
- Certificateless threshold signature scheme from bilinear maps
- Forward-secure identity-based signature: security notions and construction
- Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing
- scientific article; zbMATH DE number 6867751 (Why is no real title available?)
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
- On security of a certificateless signcryption scheme
- Certificateless threshold signature secure in the standard model
- Certificate-based signcryption with enhanced security features
- Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
- Efficient and Provably Secure Certificateless Multi-receiver Signcryption
- Cryptanalysis of a certificateless signcryption scheme in the standard model
- Notes on the security of certificateless aggregate signature schemes
This page was built for publication: Certificateless signcryption scheme in the standard model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q845333)