scientific article

From MaRDI portal
Publication:3043928

zbMath1055.94533MaRDI QIDQ3043928

Yuliang Zheng, Ron Steinfeld, Joonsang Baek

Publication date: 9 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2274/22740080.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (23)

A generic solution to realize public verifiability of signcryptionAnalysis of improved signcryption scheme with key privacyConstructing parallel long-message signcryption scheme from trapdoor permutationA Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding TheoryOn the security of joint signature and encryption revisitedCertificate-based signcryption with enhanced security featuresEfficient proxy signcryption scheme with provable CCA and CMA securityA code-based hybrid signcryption schemeIdentity-based aggregate signcryption in the standard model from multilinear mapsAn efficient identity based generalized signcryption schemeSigncryption Schemes Based on the Diffie–Hellman ProblemHybrid SigncryptionApplications of SigncryptionSigncryption schemes with insider security in an ideal permutation modelCryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystemIdentity Based Public Verifiable Signcryption SchemeSigncryption from randomness recoverable public key encryptionECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted MessageOn the Security of Identity Based Ring Signcryption SchemesAn efficient signcryption scheme with forward secrecy based on elliptic curveEfficient and Provably Secure Certificateless Multi-receiver SigncryptionDigital SignaturesOn the Security of Tag-KEM for Signcryption







This page was built for publication: