Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:4037492

zbMath0825.68374MaRDI QIDQ4037492

Marc Girault

Publication date: 18 May 1993


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (49)

An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problemRepairing ElGamal-like multi-signature schemes using self-certified public keysLow-Cost Cryptography for Privacy in RFID SystemsCertificateless signature: a new security model and an improved generic constructionA pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumptionAn efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystemStrong Designated Verifier Signature Scheme Based on Discrete Logarithm ProblemIdentity-based key distribution for mobile ad hoc networksSimulatability and security of certificateless threshold signaturesOn the Security of Distributed Multiprime RSAAn efficient identity-based key exchange protocol with KGS forward secrecy for low-power devicesCertificateless message recovery signatures providing Girault's level-3 securityCertificateless Public Key Signature Schemes from Standard AlgorithmsA new key authentication scheme based on discrete logarithmsDelegation of signing rights using certificateless proxy signaturesStrongly secure certificateless signature scheme supporting batch verificationEfficient signature generation by smart cardsAn ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key SystemCertificateless threshold cryptosystem secure against chosen-ciphertext attackCertificateless undeniable signature schemeNew Constructions and Applications of Trapdoor DDH GroupsDigital signature with message recovery using self-certified public keys without trustworthy system authorityCryptanalysis of an authenticated encryption scheme using self-certified public keysSelf-generated-certificate public key encryption without pairing and its applicationImprovement of digital signature with message recovery using self-certified public keys and its variantsA Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanismSelf-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceabilityImprovement of Tseng et al.'s authenticated encryption schemeCertificateless cryptography with KGC trust level 3Security of self-certified signaturesCertificate-Based Signatures: New Definitions and a Generic Construction from Certificateless SignaturesA Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product ExponentsSignatures in hierarchical certificateless cryptography: efficient constructions and provable securityA note on Girault's self-certified modelA Schnorr-Like Lightweight Identity-Based Signature SchemeUniversal forgery on a group signature scheme using self-certified public keysSelf-certified multi-proxy signature schemes with message recoveryAn Efficient On-Line/Off-Line Signature Scheme without Random OraclesThe GPS Identification Scheme Using Frobenius ExpansionsCryptanalysis and improvement of the Tzeng-Hwang authenticated encryption scheme based on elliptic curve discrete logarithm problemPractical convertible authenticated encryption schemes using self-certified public keysCryptanalysis of some signature schemes with message recoveryImprovement of efficient proxy signature schemes using self-certified public keysSeveral security schemes constructed using ECC-based self-certified public key cryptosystemsSecurity of Tzeng-Hwang's authenticated encryption scheme based on elliptic curve discrete logarithm problemsEfficient proxy signature schemes using self-certified public keysDigital signature with message recovery using self-certified public keys and its variantsAn efficient certificateless undeniable signature scheme




This page was built for publication: