Simulatability and security of certificateless threshold signatures
From MaRDI portal
(Redirected from Publication:865909)
Recommendations
- Certificateless threshold signature scheme from bilinear maps
- Certificateless threshold signature secure in the standard model
- Efficient certificateless threshold signatures without random oracles
- Applied Cryptography and Network Security
- Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
Cites work
- scientific article; zbMATH DE number 177613 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- Certificateless public key cryptography
- Computational Science and Its Applications – ICCSA 2004
- Identity-based cryptosystems and signature schemes
- Information Security
- Information Security and Privacy
- Progress in Cryptology - INDOCRYPT 2004
- Robust ID-based threshold signcryption scheme from pairings
- Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups
Cited in
(22)- Efficient certificateless proxy signature scheme
- Self-generated-certificate public key encryption without pairing and its application
- Secret image sharing based on chaotic map and Chinese remainder theorem
- Certificateless threshold ring signature
- Group-oriented setting's multisigncryption scheme with threshold designcryption
- Convertible multi-authenticated encryption scheme
- Hybrid proxy multisignature: a new type multi-party signature
- Efficient elliptic curve scalar multiplication algorithms resistant to power analysis
- Efficient certificateless proxy signature scheme with provable security
- Certificateless threshold signature scheme from bilinear maps
- Certificateless signcryption scheme in the standard model
- Certificateless threshold cryptosystem secure against chosen-ciphertext attack
- A novel elliptic curve scalar multiplication algorithm against power analysis
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
- A multisecret sharing scheme for color images based on cellular automata
- New \((t, n)\) threshold directed signature scheme with provable security
- Certificateless threshold signature secure in the standard model
- Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
- Efficient certificateless threshold signatures without random oracles
- Certificateless undeniable signature scheme
- Non-interactive identity-based threshold signature scheme without random oracles
- Certificateless proxy signature from RSA
This page was built for publication: Simulatability and security of certificateless threshold signatures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q865909)