On the relation among various security models for certificateless cryptography
From MaRDI portal
Publication:1001679
DOI10.1504/IJACT.2008.021084zbMath1154.94399OpenAlexW1976512735MaRDI QIDQ1001679
Publication date: 24 February 2009
Published in: International Journal of Applied Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1504/ijact.2008.021084
identity-based cryptographycertificateless cryptographysecurity modelscertificateless encryptionKey escrowKGCmalicious Key generation centrepartial Key replacement attack
Related Items (2)
A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model ⋮ Certificateless threshold ring signature
This page was built for publication: On the relation among various security models for certificateless cryptography