scientific article
From MaRDI portal
Publication:4037492
zbMath0825.68374MaRDI QIDQ4037492
Publication date: 18 May 1993
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (49)
An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem ⋮ Repairing ElGamal-like multi-signature schemes using self-certified public keys ⋮ Low-Cost Cryptography for Privacy in RFID Systems ⋮ Certificateless signature: a new security model and an improved generic construction ⋮ A pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumption ⋮ An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem ⋮ Strong Designated Verifier Signature Scheme Based on Discrete Logarithm Problem ⋮ Identity-based key distribution for mobile ad hoc networks ⋮ Simulatability and security of certificateless threshold signatures ⋮ On the Security of Distributed Multiprime RSA ⋮ An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices ⋮ Certificateless message recovery signatures providing Girault's level-3 security ⋮ Certificateless Public Key Signature Schemes from Standard Algorithms ⋮ A new key authentication scheme based on discrete logarithms ⋮ Delegation of signing rights using certificateless proxy signatures ⋮ Strongly secure certificateless signature scheme supporting batch verification ⋮ Efficient signature generation by smart cards ⋮ An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System ⋮ Certificateless threshold cryptosystem secure against chosen-ciphertext attack ⋮ Certificateless undeniable signature scheme ⋮ New Constructions and Applications of Trapdoor DDH Groups ⋮ Digital signature with message recovery using self-certified public keys without trustworthy system authority ⋮ Cryptanalysis of an authenticated encryption scheme using self-certified public keys ⋮ Self-generated-certificate public key encryption without pairing and its application ⋮ Improvement of digital signature with message recovery using self-certified public keys and its variants ⋮ A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) ⋮ Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism ⋮ Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability ⋮ Improvement of Tseng et al.'s authenticated encryption scheme ⋮ Certificateless cryptography with KGC trust level 3 ⋮ Security of self-certified signatures ⋮ Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures ⋮ A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents ⋮ Signatures in hierarchical certificateless cryptography: efficient constructions and provable security ⋮ A note on Girault's self-certified model ⋮ A Schnorr-Like Lightweight Identity-Based Signature Scheme ⋮ Universal forgery on a group signature scheme using self-certified public keys ⋮ Self-certified multi-proxy signature schemes with message recovery ⋮ An Efficient On-Line/Off-Line Signature Scheme without Random Oracles ⋮ The GPS Identification Scheme Using Frobenius Expansions ⋮ Cryptanalysis and improvement of the Tzeng-Hwang authenticated encryption scheme based on elliptic curve discrete logarithm problem ⋮ Practical convertible authenticated encryption schemes using self-certified public keys ⋮ Cryptanalysis of some signature schemes with message recovery ⋮ Improvement of efficient proxy signature schemes using self-certified public keys ⋮ Several security schemes constructed using ECC-based self-certified public key cryptosystems ⋮ Security of Tzeng-Hwang's authenticated encryption scheme based on elliptic curve discrete logarithm problems ⋮ Efficient proxy signature schemes using self-certified public keys ⋮ Digital signature with message recovery using self-certified public keys and its variants ⋮ An efficient certificateless undeniable signature scheme
This page was built for publication: