Simulatability and security of certificateless threshold signatures
From MaRDI portal
Publication:865909
DOI10.1016/J.INS.2006.08.008zbMATH Open1125.94039OpenAlexW2077406089MaRDI QIDQ865909FDOQ865909
Authors: Haifeng Qian, Licheng Wang, Zhenfu Cao, Xiangxue Li
Publication date: 20 February 2007
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2006.08.008
Recommendations
- Certificateless threshold signature scheme from bilinear maps
- Certificateless threshold signature secure in the standard model
- Efficient certificateless threshold signatures without random oracles
- Applied Cryptography and Network Security
- Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
Cites Work
- Identity-based cryptosystems and signature schemes
- Title not available (Why is that?)
- Information Security and Privacy
- Certificateless public key cryptography
- Information Security
- Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups
- Title not available (Why is that?)
- Progress in Cryptology - INDOCRYPT 2004
- Robust ID-based threshold signcryption scheme from pairings
- Computational Science and Its Applications – ICCSA 2004
Cited In (22)
- Efficient certificateless proxy signature scheme
- Secret image sharing based on chaotic map and Chinese remainder theorem
- Self-generated-certificate public key encryption without pairing and its application
- Certificateless threshold ring signature
- Group-oriented setting's multisigncryption scheme with threshold designcryption
- Convertible multi-authenticated encryption scheme
- Hybrid proxy multisignature: a new type multi-party signature
- Efficient elliptic curve scalar multiplication algorithms resistant to power analysis
- Efficient certificateless proxy signature scheme with provable security
- Certificateless threshold signature scheme from bilinear maps
- Certificateless signcryption scheme in the standard model
- Certificateless threshold cryptosystem secure against chosen-ciphertext attack
- A novel elliptic curve scalar multiplication algorithm against power analysis
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
- New \((t, n)\) threshold directed signature scheme with provable security
- A multisecret sharing scheme for color images based on cellular automata
- Certificateless threshold signature secure in the standard model
- Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
- Efficient certificateless threshold signatures without random oracles
- Certificateless undeniable signature scheme
- Non-interactive identity-based threshold signature scheme without random oracles
- Certificateless proxy signature from RSA
This page was built for publication: Simulatability and security of certificateless threshold signatures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q865909)