scientific article
From MaRDI portal
Publication:3043928
zbMath1055.94533MaRDI QIDQ3043928
Yuliang Zheng, Ron Steinfeld, Joonsang Baek
Publication date: 9 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2274/22740080.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (23)
A generic solution to realize public verifiability of signcryption ⋮ Analysis of improved signcryption scheme with key privacy ⋮ Constructing parallel long-message signcryption scheme from trapdoor permutation ⋮ A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory ⋮ On the security of joint signature and encryption revisited ⋮ Certificate-based signcryption with enhanced security features ⋮ Efficient proxy signcryption scheme with provable CCA and CMA security ⋮ A code-based hybrid signcryption scheme ⋮ Identity-based aggregate signcryption in the standard model from multilinear maps ⋮ An efficient identity based generalized signcryption scheme ⋮ Signcryption Schemes Based on the Diffie–Hellman Problem ⋮ Hybrid Signcryption ⋮ Applications of Signcryption ⋮ Signcryption schemes with insider security in an ideal permutation model ⋮ Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem ⋮ Identity Based Public Verifiable Signcryption Scheme ⋮ Signcryption from randomness recoverable public key encryption ⋮ ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message ⋮ On the Security of Identity Based Ring Signcryption Schemes ⋮ An efficient signcryption scheme with forward secrecy based on elliptic curve ⋮ Efficient and Provably Secure Certificateless Multi-receiver Signcryption ⋮ Digital Signatures ⋮ On the Security of Tag-KEM for Signcryption
This page was built for publication: