Pages that link to "Item:Q5451088"
From MaRDI portal
The following pages link to Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps (Q5451088):
Displaying 50 items.
- On the security of joint signature and encryption revisited (Q350517) (← links)
- Certificate-based signcryption with enhanced security features (Q356006) (← links)
- Signal-flow-based analysis of wireless security protocols (Q385716) (← links)
- Certificateless message recovery signatures providing Girault's level-3 security (Q407496) (← links)
- Creation of identity-based digital signature schemes from bilinear maps (Q466389) (← links)
- A pairing-based publicly verifiable secret sharing scheme (Q545465) (← links)
- Forward-secure identity-based signature: security notions and construction (Q621647) (← links)
- An efficient identity based generalized signcryption scheme (Q653334) (← links)
- Provable secure identity based generalized signcryption scheme (Q708214) (← links)
- An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices (Q884001) (← links)
- Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext (Q893723) (← links)
- Identity-based aggregate signcryption in the standard model from multilinear maps (Q1712499) (← links)
- Identity-based authenticated encryption with identity confidentiality (Q2067611) (← links)
- Efficient traceable ring signature scheme without pairings (Q2176288) (← links)
- Forward-secure ID based digital signature scheme with forward-secure private key generator (Q2195298) (← links)
- Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model (Q2256406) (← links)
- Identity-based signatures in standard model (Q2317833) (← links)
- An efficient signcryption for data access control in cloud computing (Q2398117) (← links)
- Secure identity-based signcryption in the standard model (Q2450504) (← links)
- Secure administration of cryptographic role-based access control for large-scale cloud storage systems (Q2509592) (← links)
- A lattice-based signcryption scheme without random oracles (Q2515427) (← links)
- A secure anonymous proxy signcryption scheme (Q2628122) (← links)
- A signcryption scheme from multilinear maps (Q2824587) (← links)
- Strong Forward Security in Identity-Based Signcryption (Q2831090) (← links)
- Traceable Identity-Based Group Signature (Q2956880) (← links)
- Establishing Trust on VANET Safety Messages (Q3076974) (← links)
- (Q3077952) (← links)
- Efficient Identity-Based Signcryption in the Standard Model (Q3092353) (← links)
- Identity-Based Deterministic Signature Scheme without Forking-Lemma (Q3098000) (← links)
- Identity Based Group Signatures from Hierarchical Identity-Based Encryption (Q3392909) (← links)
- Two Notes on the Security of Certificateless Signatures (Q3503872) (← links)
- ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message (Q3600317) (← links)
- An Efficient ID-Based Proxy Signature Scheme from Pairings (Q3600319) (← links)
- A Schnorr-Like Lightweight Identity-Based Signature Scheme (Q3637136) (← links)
- Digital Signatures (Q5050199) (← links)
- Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption (Q5233839) (← links)
- Advances in Cryptology – CRYPTO 2004 (Q5311558) (← links)
- Advances in Cryptology - CRYPTO 2003 (Q5428132) (← links)
- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures (Q5445450) (← links)
- Multi-key Hierarchical Identity-Based Signatures (Q5448550) (← links)
- Efficient ID-Based Digital Signatures with Message Recovery (Q5458495) (← links)
- Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption (Q5502750) (← links)
- Efficient and Provably Secure Certificateless Multi-receiver Signcryption (Q5505458) (← links)
- Topics in Cryptology – CT-RSA 2005 (Q5710840) (← links)
- Public Key Cryptography - PKC 2005 (Q5711580) (← links)
- Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey (Q6101318) (← links)
- Efficient IBS from a new assumption in the multivariate-quadratic setting (Q6169496) (← links)
- Fully anonymous identity-based broadcast signcryption with public verification (Q6190008) (← links)
- A tightly secure ID-based signature scheme under DL assumption in AGM (Q6535485) (← links)
- Sign-then-encrypt with security enhancement and compressed ciphertext (Q6658310) (← links)