Signcryption schemes with threshold unsigncryption, and applications
From MaRDI portal
Publication:2439735
DOI10.1007/S10623-012-9688-0zbMath1323.94116OpenAlexW1977254827MaRDI QIDQ2439735
Javier Herranz, Alexandre Ruiz, Germán Sáez
Publication date: 17 March 2014
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/2117/105873
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Secure distributed key generation for discrete-log based cryptosystems
- Security arguments for digital signatures and blind signatures
- Securing threshold cryptosystems against chosen ciphertext attack
- How to share a secret
- One-Time Signatures and Chameleon Hash Functions
- On the Security of Identity Based Ring Signcryption Schemes
- Practical Threshold Signatures Without Random Oracles
- Fully Secure Threshold Unsigncryption
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - CRYPTO 2003
- Short Threshold Signature Schemes Without Random Oracles
- Information Security and Cryptology
- Topics in Cryptology – CT-RSA 2006
- Public Key Cryptography - PKC 2006
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Signcryption schemes with threshold unsigncryption, and applications