Several security schemes constructed using ECC-based self-certified public key cryptosystems
From MaRDI portal
Publication:2572699
DOI10.1016/j.amc.2004.09.010zbMath1076.94016OpenAlexW2034557220MaRDI QIDQ2572699
Publication date: 4 November 2005
Published in: Applied Mathematics and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.amc.2004.09.010
Information securityCertificate-based public key cryptosystemsElliptic curve cryptosystemsID-based public key cryptosystemsSelf-certified public key cryptosystems
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A note on Girault's self-certified model
- Authenticated encryption schemes with message linkage
- Message recovery for signature schemes based on the discrete logarithm problem
- The state of elliptic curve cryptography
- Identity-Based Cryptosystems and Signature Schemes
- Identity-based authenticated key agreement protocol based on Weil pairing
- Elliptic Curve Cryptosystems
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)
- Monte Carlo Methods for Index Computation (mod p)
- Reducing elliptic curve logarithms to logarithms in a finite field
- Evaluation of discrete logarithms in a group of 𝑝-torsion points of an elliptic curve in characteristic 𝑝
- ID-Based Blind Signature and Ring Signature from Pairings
- Hierarchical ID-Based Cryptography
This page was built for publication: Several security schemes constructed using ECC-based self-certified public key cryptosystems