Self-generated-certificate public key encryption without pairing and its application
From MaRDI portal
Recommendations
- Self-Generated-Certificate Public Key Encryption Without Pairing
- Information Security
- Certificateless public key encryption: a new generic construction and two pairing-free schemes
- Strongly Secure Certificateless Public Key Encryption Without Pairing
- Certificateless public key cryptography
- A new certificateless public key encryption scheme
- General and Efficient Certificateless Public Key Encryption Constructions
- Certificateless public key signature scheme without pairing
- Computational Science and Its Applications – ICCSA 2004
- Certified public key encryption without pairing calculation using standard model
Cites work
- scientific article; zbMATH DE number 177613 (Why is no real title available?)
- scientific article; zbMATH DE number 177618 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- A method for obtaining digital signatures and public-key cryptosystems
- Applied Cryptography and Network Security
- Breaking the short certificateless signature scheme
- Certificateless Signature Revisited
- Certificateless public key cryptography
- Certificateless threshold cryptosystem secure against chosen-ciphertext attack
- Certificateless undeniable signature scheme
- Computational Science and Its Applications – ICCSA 2004
- Cryptography. Theory and practice
- Cryptology and Network Security
- Efficient Certificateless Signature Schemes
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient signature generation by smart cards
- Generic constructions of identity-based and certificateless kEMs
- How to share a secret
- Identity-based cryptosystems and signature schemes
- Information Security
- Information Security and Privacy
- Key Replacement Attack Against a Generic Construction of Certificateless Signature
- New directions in cryptography
- Public Key Cryptography - PKC 2006
- Public Key Cryptography - PKC 2006
- Public-key encryption with chaos
- Security of public key encryption technique based on multiple chaotic systems
- Security of public-key cryptosystems based on Chebyshev polynomials
- Security proofs for signature schemes
- Simulatability and security of certificateless threshold signatures
Cited in
(3)
This page was built for publication: Self-generated-certificate public key encryption without pairing and its application
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q545362)